bonsaiviking / TarPyt
A web spider's worst nightmare.
☆53Updated 12 years ago
Alternatives and similar repositories for TarPyt:
Users that are interested in TarPyt are comparing it to the libraries listed below
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- ☆27Updated 7 years ago
- Cryptowall Tooling & Information☆34Updated 9 years ago
- ☆50Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- ☆25Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- ☆45Updated 7 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- Small scripts for doing repeatable tasks☆25Updated 2 years ago
- first commit☆20Updated last year
- Malware analysis using Docker project☆25Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- AYY LMAO☆21Updated 8 years ago
- ☆47Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- Babel Scripting Framework☆42Updated 4 years ago