iavael / torcat
netcat for onion router
☆9Updated last week
Alternatives and similar repositories for torcat:
Users that are interested in torcat are comparing it to the libraries listed below
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- An SSH honeypot written entirely in Go.☆13Updated 2 months ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆30Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A library for peer discovery inside the Tor network☆27Updated 11 months ago
- A tool collection about BitTorrent.☆12Updated 2 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Simple Mega.co.nz Account Bruteforce Tool☆12Updated 7 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- Standalone I2P reseed server☆26Updated 5 years ago
- pentest toolbox☆28Updated 2 years ago
- Tor bridge running obfs4 obfuscation protocol in Alpine 🐳☆8Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- 🌐 "Net" — A collection of bot-nets and bot-net supplies for DOCUMENTING and ARCHIVING purposes ONLY!☆19Updated 3 years ago
- Capturing audio (.wav) from target using a link☆12Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Python libraries for Windows system coding☆14Updated 4 years ago
- Much like John the Ripper, without all the fancy shit. Just reads from a wordlist and cracks those hashes.☆15Updated 4 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 3 months ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 4 years ago
- IP camera bruteforcer, 32 bit version☆14Updated 9 years ago
- I2P analysis network.☆15Updated 9 years ago