cretz / rtsw-pocLinks
Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept
☆12Updated 7 years ago
Alternatives and similar repositories for rtsw-poc
Users that are interested in rtsw-poc are comparing it to the libraries listed below
Sorting:
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- Delicious Onion Service Wraps.☆23Updated 10 years ago
- oht is an onion routed (using the Tor network, similar in design to ricochet and onionshare) distributed hash table to be used as the bas…☆45Updated 6 years ago
- Minimal forensic/exfiltration/evil-maid/rescue live boot system☆12Updated 5 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Tor relay implementation in Golang☆76Updated 4 years ago
- A warrant canary system☆30Updated 7 years ago
- torrent -> http plumbing☆24Updated 4 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 3 years ago
- ☆28Updated 9 years ago
- Go seccomp parser and compiler☆53Updated 8 years ago
- A pure-go implementation of the Axolotl Ratchet, extracted from pond☆21Updated 8 years ago
- graffiti sends ASCII-art texts to remote webserver logs using consecutive 404 errors☆35Updated 5 years ago
- The noise swiss army knife☆44Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- SSH Honeypot written in Go☆29Updated 11 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 9 years ago
- XChaCha8Blake3Siv is a nonce-reuse misuse-resistant (NRMR) and key-committing authenticated encryption with associated data (AEAD) algori…☆17Updated 3 years ago
- Tor Control Port Filter and State Tracker Daemon☆26Updated 7 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆52Updated 4 years ago
- End-to-End encrypted Tor2Web gateway☆37Updated 4 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- ☆20Updated 4 years ago
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆48Updated 13 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆23Updated 7 months ago
- dnsoverhttps - D'oh!☆14Updated 6 years ago
- orc - Onion router control protocol library.☆40Updated 7 years ago
- MetaSSH connects to and runs commands on thousands of machines in seconds.☆19Updated 6 years ago
- Implementation of KangarooTwelve in Go☆94Updated 4 years ago