nusenu / trustor-poc
trustor (PoC)
☆25Updated 3 years ago
Alternatives and similar repositories for trustor-poc:
Users that are interested in trustor-poc are comparing it to the libraries listed below
- quotes i like.☆15Updated 5 years ago
- Multi-head SSH honeypot system.☆21Updated last year
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- THC "R U There" network discovery tool☆27Updated 5 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- TCP ISN CPU Information Leak Protection. TCP Initial Sequence Numbers Randomization to prevent TCP ISN based CPU Information Leaks.☆49Updated 3 months ago
- Silly proof-of-concept for a PDF chatroom☆21Updated 2 years ago
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆13Updated 5 months ago
- Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.☆36Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Automatically detected Relay Groups on the Tor Network☆13Updated last year
- Geolocate your files!☆16Updated 3 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- ☆24Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 6 months ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆54Updated 2 weeks ago
- Explore the Tor network☆87Updated 2 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated last month
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- An HTTP proxy that enables access to Tor Onion Services☆15Updated 3 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆40Updated 7 years ago
- Simple Go Discord Bot☆22Updated 2 years ago
- BusKill kill cord for Linux☆36Updated 4 years ago
- ☆23Updated 8 months ago
- ☆12Updated 2 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago