oftn-oswg / zerodropLinks
A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware
☆106Updated 10 months ago
Alternatives and similar repositories for zerodrop
Users that are interested in zerodrop are comparing it to the libraries listed below
Sorting:
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 3 years ago
- Truehunter☆31Updated 4 years ago
- Fast browser-based network discovery module☆114Updated 4 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated last year
- Cross-Platform Reverse Socks Proxy in Go☆27Updated 2 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- An open source tool to capture screen and network instantly helping security engineers reproduce bugs☆83Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆65Updated 6 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago