cea-sec / TorPylle
A Python / Scapy implementation of the OR (TOR) protocol.
☆95Updated 2 years ago
Related projects: ⓘ
- python tor client☆26Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆55Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 2 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- The Swiss army knife of byte manipulation☆42Updated 7 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- ☆35Updated 12 years ago
- ☆36Updated this week
- Local and Remote Maltego Rapid Transform Development Framework☆101Updated 8 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 3 years ago
- ☆27Updated this week
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Updated 3 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 8 years ago
- A tool for netpens.☆29Updated 5 years ago
- Repository for Tor's DNS-related issues.☆17Updated 7 years ago
- Parsing library for Tor-specific data formats.☆44Updated last year
- tundeep☆42Updated 5 years ago
- ☆75Updated this week
- ☆34Updated this week
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Updated 6 years ago
- Base Code for P2P Network Crawlers☆31Updated 11 years ago
- ☆42Updated this week
- ☆15Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 7 years ago