nametoolong / oreganoLinks
Man-in-the-middle against Tor bridges
☆27Updated 5 years ago
Alternatives and similar repositories for oregano
Users that are interested in oregano are comparing it to the libraries listed below
Sorting:
- A repository of Tor hidden services.☆65Updated 3 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 10 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Updated 6 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Updated last year
- Network white noise collector☆19Updated 9 years ago
- A simple script for translating IP addresses to GeoLocations☆46Updated 3 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- Create Tor hidden services in Python.☆52Updated 2 years ago
- flood area with fake essids☆20Updated 8 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Updated 7 years ago
- Various exploits☆10Updated 8 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆37Updated 10 years ago
- It's a tool which generate a dictionary from a csv containing personals informations. Generate all common passwords based on perso info.…☆57Updated 5 years ago
- Use Tor for anonymous scanning with nmap☆85Updated 10 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Updated 14 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- OS Hardening scripts for multiple linux based operating systems. Keep in mind this is the minimum!☆21Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 7 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 8 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 4 months ago
- A copy of articles published at Peerlyst☆41Updated 9 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆45Updated 6 years ago