hackerschoice / gs-transfer
Secure File Transfer via Global Socket Bounce Network
☆24Updated 3 years ago
Alternatives and similar repositories for gs-transfer:
Users that are interested in gs-transfer are comparing it to the libraries listed below
- THC "R U There" network discovery tool☆27Updated 4 years ago
- ARP Man-in-the-Middle tool☆28Updated 2 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- suspect is a simple bash triage tool☆18Updated 6 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- ☆22Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated this week
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- ☆37Updated 2 years ago
- quality of life☆18Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- A scanner of the "World's Scariest" scanner☆16Updated 2 years ago
- Truehunter☆31Updated 3 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- ☆16Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- Hunting cryptonote-related miners☆22Updated 4 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- ☆24Updated last year