jseidl / torblock
TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.
☆48Updated 12 years ago
Alternatives and similar repositories for torblock:
Users that are interested in torblock are comparing it to the libraries listed below
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Popping boxes with Nmap☆18Updated 12 years ago
- python tor client☆27Updated 9 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆48Updated 10 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Updated 4 years ago
- ☆15Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Password analysis software☆37Updated 9 years ago
- Bruteforce attack blocker (ssh, FTP, SMTP, and more)☆64Updated 3 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- ☆53Updated 8 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- post-exploitation tools☆15Updated 7 years ago
- The third open source piece of ransomware using bash☆15Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆97Updated 3 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago