rly0nheart / tor2tor
Capture screenshots of onion services on an onion service.
☆49Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for tor2tor
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated 11 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 7 months ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆28Updated 6 months ago
- Web Path Finder☆58Updated 11 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago
- OSINT tool for username, email and domains☆19Updated 5 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 4 months ago
- Challenge Python☆19Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆47Updated 2 weeks ago
- Tools and Resources for Physical Security Red Teaming☆23Updated 3 months ago
- 🕵️ Email osint tool☆60Updated last year
- ☆23Updated 11 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆24Updated last month
- Recon scripts for Red Team and Web blackbox auditing☆29Updated this week
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆24Updated 5 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 4 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆55Updated 10 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 3 weeks ago
- Fast Path Traversal exploitation tool☆21Updated 6 months ago
- A simple pentest container equipped with common python pentest tools.☆41Updated last week
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- Mass bruteforce authentication of network protocols☆44Updated 11 months ago
- Sniffing out well-known threat groups☆28Updated 2 months ago
- ☆17Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 4 months ago