oftn-oswg / zerodrop
A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware
☆105Updated 7 months ago
Alternatives and similar repositories for zerodrop:
Users that are interested in zerodrop are comparing it to the libraries listed below
- A sub-domain reconnaissance written in golang☆12Updated 7 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Web on top of any protocol☆114Updated 4 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- ☆25Updated 7 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- ☆44Updated 6 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- MimeCast Password Spraying Tool☆45Updated 5 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Modular rootkit framework.☆27Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- CLI tool for PKCS7 padding oracle attacks☆135Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆65Updated 7 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆76Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- ☆28Updated 8 years ago