nyxnor / onionjugglerLinks
Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.
☆38Updated 2 years ago
Alternatives and similar repositories for onionjuggler
Users that are interested in onionjuggler are comparing it to the libraries listed below
Sorting:
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- This is a setup for a Tor based mail hosting server☆26Updated 6 months ago
- Onion Tunnel: Proxy Every Hidden Service on localhost☆13Updated 4 years ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆14Updated last month
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 8 months ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Uses NASM Shell Tool from Metasploit to friendly export Python / C / CPP shellcode from assembly instructions.☆17Updated 4 years ago
- Docker environment for hackers☆16Updated 5 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆48Updated last year
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆90Updated last month
- Binary and Static Releases☆15Updated 2 months ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Updated 3 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- ☆31Updated 5 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆53Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- tor/i2p/lokinet socks proxy router☆32Updated last year
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆24Updated 4 years ago
- Tiny embeddable dns server☆51Updated last week