A reverse shell wrapper for tor servers. Get a shell over tor via socat.
☆13Dec 10, 2015Updated 10 years ago
Alternatives and similar repositories for onionslicer
Users that are interested in onionslicer are comparing it to the libraries listed below
Sorting:
- A tiny Tor client implementation (written in C).☆20Aug 15, 2018Updated 7 years ago
- https://github.com/xHak9x/fbi.git☆11Nov 17, 2019Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Malduino Elite firmware☆46May 31, 2017Updated 8 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- A Layer-7 HTTP DOS tool☆10Jul 12, 2018Updated 7 years ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- this used to be a private virus but i have it so now its not☆12Oct 18, 2021Updated 4 years ago
- Analizador de tráfico para dispositivos Android potencialmente comprometidos como parte de una botnet orientado a detectar ataques DDoS.☆13Jun 20, 2018Updated 7 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Extract an entire quiz from Socrative Student using this extention, without wait for the next question! View everything at once!☆12Jan 14, 2024Updated 2 years ago
- Hiding a message in a data table such as a CSV or parquet file☆12Updated this week
- Simple python script to generate an ad-free hosts file☆11Sep 15, 2016Updated 9 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Node.js implementation of the PirateBox Server inspired by David Darts☆15Dec 8, 2015Updated 10 years ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- The most basic dynamic function row daemon possible☆11Jul 29, 2024Updated last year
- Convert GnuPG private keys to Tor hidden service keys (and vice versa)☆12Jun 11, 2015Updated 10 years ago
- Testing new resource style☆10Nov 20, 2024Updated last year
- Product Manager. Allow to create and list products on a site. Create dynamical attributes for products. Filter by categories and attribut…☆11Feb 28, 2025Updated last year
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Git and Bash Based Encrypted Remote Interactive Shell (GiBBERISh). For when you cannot use SSH.☆12Apr 23, 2021Updated 4 years ago
- Basic SOCKS 5 client library in Tcl.☆13Aug 6, 2022Updated 3 years ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- This code asks the user to enter fifty 4-digit PINs, each 5 times, and saves the PINs and their sensor measurements (motion and orientati…☆12Feb 10, 2017Updated 9 years ago
- Code that is used in "AI learns to shoot ZOMBIES": https://youtu.be/o5Tu1HOhriU☆13Oct 23, 2018Updated 7 years ago
- Spacedrum instrument playable in browser☆27Nov 23, 2023Updated 2 years ago
- Docker container escape enumeration tool.☆12Jan 23, 2021Updated 5 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- CVE-2021-41773 | CVE-2021-42013 Exploit Tool (Apache/2.4.49-2.4.50)☆10Apr 8, 2022Updated 3 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆14Jun 21, 2022Updated 3 years ago
- ☆11Jun 4, 2019Updated 6 years ago
- A very simple Flask application that demonstrates how to integrate OpenID connect into user session management.☆12Jul 5, 2018Updated 7 years ago
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- ☆11Nov 28, 2016Updated 9 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- A box containing all you need to get started with our Pet Shop tutorial.☆11Mar 2, 2018Updated 8 years ago