oftn-oswg / zerodrop
A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware
☆105Updated 4 months ago
Alternatives and similar repositories for zerodrop:
Users that are interested in zerodrop are comparing it to the libraries listed below
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Updated last year
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Web on top of any protocol☆114Updated 4 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- RDP honeypot☆64Updated 5 years ago
- Utility to generate similar IDN domain names☆47Updated 6 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- ☆68Updated 3 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- CLI tool for PKCS7 padding oracle attacks☆135Updated 3 years ago
- GO sandbox to run untrusted code☆40Updated 5 years ago
- A Linux shell script to improve your privacy online☆83Updated 8 years ago
- A sub-domain reconnaissance written in golang☆12Updated 7 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- A CHaracter Aware Splitting Method for producing password candidates.☆41Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago