mheinl / OnionCrawlerLinks
Scrapy spider to recursively crawl for TOR hidden services
☆11Updated 7 years ago
Alternatives and similar repositories for OnionCrawler
Users that are interested in OnionCrawler are comparing it to the libraries listed below
Sorting:
- An index which uses 'spiders' to crawl and explore every discoverable hidden service on Tor.☆9Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Find infected ms17-010 machines☆12Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Uptime checker for tor hidden services☆12Updated 7 years ago
- A standalone addon for GnuPG☆18Updated 6 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 4 years ago
- The great patator tool compiled for Windows☆26Updated 8 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Polite, slim and concurrent web crawler.☆13Updated 4 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23Updated 3 years ago
- Detecting malicious WiFi with mining cryptocurrency.☆48Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- Dockerised Version of Frida☆21Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- ☆12Updated 8 years ago
- Scan networks for HTTP servers, do stuff when you find them.☆13Updated 7 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- ☆11Updated 7 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- HTTP(S) directory/file brute forcer☆21Updated 2 years ago
- python scripts for penetration testing☆11Updated 5 years ago