Remotely accessible Tor hidden service deployment suite
☆24Dec 7, 2018Updated 7 years ago
Alternatives and similar repositories for dropPoint
Users that are interested in dropPoint are comparing it to the libraries listed below
Sorting:
- ☆17Nov 25, 2015Updated 10 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- A simple way of exposing any docker container as a tor hidden service☆29Aug 1, 2014Updated 11 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- Python wrapper for the whitepages api. For more information about the whitepages api see their documentation at http://pro.whitepages.com…☆12Apr 27, 2015Updated 10 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆135Dec 10, 2021Updated 4 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 7 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Easy-as RPC. Zero-server RPC for Python and Java.☆44Aug 23, 2016Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- Python OSINT Tool to retrieve information from Skype☆76Oct 12, 2015Updated 10 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆31Aug 13, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- A Python port of the triplesec library.☆82Jan 5, 2024Updated 2 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Windows 7 UAC Bypass Vulnerability in the Windows Script Host☆106Aug 26, 2015Updated 10 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆17Aug 30, 2025Updated 6 months ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Viewer for Observing Multiple Computers using VNC☆19Feb 13, 2010Updated 16 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago