nametoolong / oreganoLinks
Man-in-the-middle against Tor bridges
☆26Updated 5 years ago
Alternatives and similar repositories for oregano
Users that are interested in oregano are comparing it to the libraries listed below
Sorting:
- A repository of Tor hidden services.☆65Updated 3 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- flood area with fake essids☆21Updated 7 years ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆32Updated 9 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆32Updated 6 years ago
- A simple script for translating IP addresses to GeoLocations☆43Updated 3 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆50Updated last year
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- Getting Envisioncollision to actually work.☆15Updated 7 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- Local Transforms for the Maltego OSINT investigative tool that act on FetLife.com.☆40Updated 5 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated 2 weeks ago
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Truehunter☆31Updated 4 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Updated 11 years ago
- Pentest ToolKit☆28Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago