nyxnor / onionjuggler
Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.
☆36Updated 2 years ago
Alternatives and similar repositories for onionjuggler:
Users that are interested in onionjuggler are comparing it to the libraries listed below
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 3 months ago
- ShellC0de Generator☆11Updated 3 years ago
- Create Containerized Clearnet Proxies☆30Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 2 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Updated last year
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- trustor (PoC)☆25Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 5 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 3 months ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- VPN based on TOR Network for your Linux based distro☆9Updated 4 years ago
- Rust-based password mutator for brute force attacks☆13Updated this week
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆12Updated last year
- DNS logging, detection, ...☆15Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago