mtrojnar / torgetLinks
Fast large file downloader over Tor
☆30Updated 11 months ago
Alternatives and similar repositories for torget
Users that are interested in torget are comparing it to the libraries listed below
Sorting:
- Tool to bruteforce Windows LDAP, Kerberos, RDP, SSH, FTP, HTTP basic and digest authentication☆25Updated 5 months ago
- Download utility for Tor☆49Updated last year
- 🧮 SOCKS5/4/4a 🌾 validating proxy pool and upstream SOCKS5 server for 🤽 LOLXDsoRANDum connections 🎋☆80Updated 8 months ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- Inject shellcode into a valid BMP/GIF image.☆30Updated 4 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated last month
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated last year
- Near compile-time string obfuscation for Golang☆13Updated last year
- ☆55Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 7 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆32Updated last month
- A simple reverse ssh/proxy implant PoC for *nix systems.☆54Updated 11 months ago
- Multiplatform multithread efficient stream rust ransomware☆16Updated 3 years ago
- masscan with exclusive excludes☆56Updated last year
- Event Tracing for Windows EDR bypass in Rust (usermode)☆24Updated 11 months ago
- Ransomware written in go, encrypt - decrypt.☆22Updated last month
- Curated list of categorized User Agents☆94Updated last week
- End-to-end Encrypted DNS Tunnelling and C2 framework☆74Updated 4 months ago
- Advanced dynamic malware analysis tool.☆83Updated last year
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 2 years ago
- Pure Go rewrite of knockknock☆10Updated 2 years ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 11 months ago
- A python based Bot Net Framework☆38Updated 2 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- Public repo of some woking evilginx phishlets☆34Updated 7 months ago
- API hooking and code injection made easy!☆37Updated last year