iavael / torcat
netcat for onion router
☆10Updated last year
Alternatives and similar repositories for torcat:
Users that are interested in torcat are comparing it to the libraries listed below
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Updated 6 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆41Updated 5 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆30Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- pentest toolbox☆28Updated 2 years ago
- Various exploits☆10Updated 7 years ago
- An SSH honeypot written entirely in Go.☆13Updated last month
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆14Updated 7 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- The path of least resistance to a Linux-only i2p browser. Modifies a tor browser and spits out a tar.gz☆9Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- Network white noise collector☆18Updated 8 years ago
- A tool for securing communications between a client and a DNS resolver☆28Updated 12 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆10Updated 7 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- A first look at browser-based Cryptojacking☆15Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 7 years ago
- Mass HTTP brute forcer to detect directories and interesting technologies☆10Updated 8 years ago
- Open-source Exploiting Framework☆29Updated 7 years ago