nyxnor / onionjugglerLinks
Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.
☆37Updated 2 years ago
Alternatives and similar repositories for onionjuggler
Users that are interested in onionjuggler are comparing it to the libraries listed below
Sorting:
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆36Updated 7 months ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆48Updated last year
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆17Updated 3 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- Bash & Python scripts for daily life☆16Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- This is a setup for a Tor based mail hosting server☆26Updated 5 months ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆51Updated 8 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆89Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 7 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- A repo of utilities built over some period for forensics, anti-forensics, security and analytical purposes☆20Updated 11 months ago
- Multi-head SSH honeypot system.☆21Updated last year
- Docker environment for hackers☆16Updated 5 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆14Updated 3 years ago
- A simple very little blockchain, just for learning.☆27Updated 5 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆23Updated 3 years ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆14Updated 4 months ago
- A crack 💥 version of Ghostify, that helps you view Instagram stories without a trace (the story owner won't know you saw their story!)☆7Updated 2 years ago
- Script to facilitate different functions and checks☆46Updated 2 years ago