ntddk / onionstack
A Pictorial Book of Tor Hidden Services.
☆23Updated 7 years ago
Alternatives and similar repositories for onionstack:
Users that are interested in onionstack are comparing it to the libraries listed below
- RAT / Botnet Simulator for pentest / education☆81Updated 5 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆108Updated 2 years ago
- Simple high-interactive client honeypot☆24Updated 7 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- ☆26Updated 4 years ago
- Analyzing Rig Exploit Kit☆50Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- ☆15Updated 8 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- A script to track malware IOCs with OSINT on Twitter.☆53Updated 10 months ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆44Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Cross platform (i.e., Windows, Linux, Mac) assessment script. The script helps assess workstations for vulnerabilities and abnormalities.☆19Updated 9 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Miscellaneous analysis tools☆26Updated 10 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago