iavael / torcat
netcat for onion router
☆9Updated last month
Alternatives and similar repositories for torcat:
Users that are interested in torcat are comparing it to the libraries listed below
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆30Updated 6 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- A tool collection about BitTorrent.☆12Updated 2 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Updated 7 years ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- hostnames registration application for I2P☆11Updated 2 years ago
- The path of least resistance to a Linux-only i2p browser. Modifies a tor browser and spits out a tar.gz☆9Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 6 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 4 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Create Containerized Clearnet Proxies☆30Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- BitBender is a byte manipulation tool☆12Updated 7 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆41Updated 5 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆19Updated 7 years ago
- IP camera bruteforcer, 32 bit version☆14Updated 9 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 11 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- An SSH honeypot written entirely in Go.☆13Updated 3 months ago
- pentest toolbox☆28Updated 2 years ago
- An apt transport method enabling i2p using the SAM bridge.☆19Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- I2P bindings for Twisted.☆15Updated 2 years ago