jonaslejon / tor-fingerprintView external linksLinks
Tor Browser and Tails version fingerprint PoC
☆137Sep 12, 2018Updated 7 years ago
Alternatives and similar repositories for tor-fingerprint
Users that are interested in tor-fingerprint are comparing it to the libraries listed below
Sorting:
- A simple ssh private key password recovery tool written in Go☆22Dec 21, 2023Updated 2 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Mar 23, 2016Updated 9 years ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 10 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 9 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- An automatic presentation generator from a TreeSheets hierarchy☆15Dec 12, 2015Updated 10 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆67Sep 13, 2014Updated 11 years ago
- ☆71Oct 19, 2015Updated 10 years ago
- Make pseudonymous Git commits over Tor☆186Aug 30, 2019Updated 6 years ago
- Serverless function composition and sharing CLI for Go☆16Feb 8, 2018Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Oct 12, 2015Updated 10 years ago
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Apr 4, 2016Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Mar 20, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- HTTP Header Analysis Vulnerability Tool☆115Dec 20, 2020Updated 5 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 8 years ago
- Go library and command line to seek for secrets on various sources.☆242Nov 14, 2019Updated 6 years ago
- Sniffing browser history using HSTS☆936Aug 5, 2017Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- An IRC bot written in node.JS that logs a channel's activity and saves it to JSON, JSONL, Markdown, or CSV☆39Mar 18, 2016Updated 9 years ago
- Provably Anonymous Overlay☆325Nov 11, 2014Updated 11 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆601Dec 6, 2024Updated last year
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 9 years ago
- a grep -r for secrets☆179May 4, 2022Updated 3 years ago