cea-sec / TorPylle
A Python / Scapy implementation of the OR (TOR) protocol.
☆98Updated 3 years ago
Alternatives and similar repositories for TorPylle:
Users that are interested in TorPylle are comparing it to the libraries listed below
- python tor client☆27Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- ☆36Updated 12 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Base Code for P2P Network Crawlers☆31Updated 11 years ago
- ☆137Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Updated 6 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- hax 'n shit☆119Updated 9 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆102Updated 8 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 12 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 3 months ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- ☆27Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago