iavael / torcat
netcat for onion router
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for torcat
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- pentest toolbox☆28Updated 2 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆74Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- A simple, lightweight Remote Access Tool written in Python☆15Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 6 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- first commit☆10Updated 7 years ago
- Utility to generate a TLS Certificate.☆16Updated 4 years ago
- Tor bridge running obfs4 obfuscation protocol in Alpine 🐳☆8Updated 9 months ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆32Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 6 years ago
- A Crawler That Crawls Email Addresses From Various Sources! Ex: pastebin, github, paste ubuntu e.t.c☆11Updated 6 years ago
- port scanner & login credential tester☆16Updated 5 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago
- Open-source Exploiting Framework☆29Updated 7 years ago
- Reverse shell and rootkit☆19Updated 7 years ago