iavael / torcat
netcat for onion router
☆9Updated last month
Alternatives and similar repositories for torcat:
Users that are interested in torcat are comparing it to the libraries listed below
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- create an onion site from a directory, file, zip or an HTTP(S) site☆30Updated 6 years ago
- IP camera bruteforcer, 32 bit version☆14Updated 9 years ago
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆33Updated 6 years ago
- Simple Mega.co.nz Account Bruteforce Tool☆12Updated 8 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- An IP-Transparent Tor Hidden Service and I2P Connector☆16Updated 11 years ago
- Create Containerized Clearnet Proxies☆30Updated 5 years ago
- An SSH honeypot written entirely in Go.☆13Updated 3 months ago
- Hack tools coded in golang☆20Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 4 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Updated 6 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- USB Attack Development Platform☆31Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- A tool / library for simplifying string obfuscation with xor.☆22Updated 9 months ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- hostnames registration application for I2P☆11Updated 2 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- A Crawler That Crawls Email Addresses From Various Sources! Ex: pastebin, github, paste ubuntu e.t.c☆11Updated 6 years ago