rly0nheart / tor2tor
Capture screenshots of onion services on an onion service.
☆48Updated 9 months ago
Alternatives and similar repositories for tor2tor:
Users that are interested in tor2tor are comparing it to the libraries listed below
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- ☆32Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 5 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last week
- Track C2 servers, tools, and botnets over time by framework and location☆37Updated last month
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- ☆36Updated 2 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆57Updated last month
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆82Updated 3 weeks ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated last year
- A Red Teaming tool focused on profiling the target.☆26Updated 8 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- 🕵️ Email osint tool☆62Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆117Updated last year
- Web Path Finder☆60Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆95Updated 4 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆27Updated 8 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆26Updated 6 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated this week
- ☆24Updated last month
- Cookie - Phishing - Altri strumenti utili - Rendersi Anonimi nel WEB - Messaggistica Sicura☆21Updated 9 months ago