TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.
☆48Jun 16, 2012Updated 13 years ago
Alternatives and similar repositories for torblock
Users that are interested in torblock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 10 years ago
- Pentest Tool to generate usernames/logins based on supplied names.☆38Jan 7, 2019Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Dec 3, 2015Updated 10 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Backdoor implementation in Ruby (testing)☆30Jul 6, 2015Updated 10 years ago
- Check Arbitrary File Download the CMS Wordpress☆14Nov 19, 2015Updated 10 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- DumpFlash for Hydrabus☆13Aug 7, 2022Updated 3 years ago
- ☆16May 6, 2015Updated 10 years ago
- My prototype of a USB-connected joystick that uses HID protocol, written in C using Atmega microcontrollers.☆10Nov 5, 2022Updated 3 years ago
- Parse http request form☆14Sep 8, 2021Updated 4 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 6 years ago
- Install script for grsecurity for Debian environments☆60Nov 30, 2015Updated 10 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- ☆12Jun 24, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Miscellaneous Scripts☆17Sep 11, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Linux RDP Scanner and Bruteforcer Scripts☆59Aug 31, 2015Updated 10 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Open Source trojan for android.☆21Mar 21, 2024Updated 2 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Aug 10, 2021Updated 4 years ago
- Webinterface to execute and see the output of shellbased webscanning software, but honestly would work with every shell program.☆12Apr 9, 2019Updated 7 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Multi Browser Kango Extension for BGPView - A DNS and BGP network visualizer☆10May 16, 2017Updated 8 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Sep 19, 2018Updated 7 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆232Sep 23, 2015Updated 10 years ago
- Detection rules to look for Log4J usage and exploitation☆18Jun 21, 2025Updated 9 months ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 12 years ago