osteth / DemonBucket
Public File Sharing Network for Demonsaw
☆18Updated 8 years ago
Alternatives and similar repositories for DemonBucket:
Users that are interested in DemonBucket are comparing it to the libraries listed below
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- ☆12Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆187Updated 5 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 11 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- NetHunter android application☆8Updated 5 years ago
- Docker container for running an IRC server as a Tor hidden service☆50Updated 6 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago
- ☆53Updated 8 years ago
- ☆42Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 13 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- voodoo networking: post-VPN session obfuscation for a post-Snowden world☆34Updated 6 years ago
- CVE-2015-3152 PoC☆43Updated 9 years ago