ntddk / onionstack
A Pictorial Book of Tor Hidden Services.
☆23Updated 7 years ago
Alternatives and similar repositories for onionstack:
Users that are interested in onionstack are comparing it to the libraries listed below
- Simple high-interactive client honeypot☆24Updated 7 years ago
- ☆26Updated 4 years ago
- A script to track malware IOCs with OSINT on Twitter.☆52Updated 8 months ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Truehunter☆31Updated 3 years ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆61Updated last month
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Updated 2 years ago
- Tool for dropping malware from EK☆41Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- RAT / Botnet Simulator for pentest / education☆80Updated 5 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated 2 months ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆30Updated 6 years ago
- Notes on offensive training☆16Updated 7 years ago
- collection of useful shells for penetration tests☆36Updated 7 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- My collection of dockerfiles☆24Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆39Updated 8 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago