skyformat99 / TinyTorLinks
A tiny Tor client implementation (written in C).
☆18Updated 7 years ago
Alternatives and similar repositories for TinyTor
Users that are interested in TinyTor are comparing it to the libraries listed below
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 2 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- inject and run code into arbitrary process (x86 and x64)☆13Updated 3 years ago
- reverse socks tunneler with ntlm and proxy support☆57Updated 3 years ago
- reverse proxy server☆21Updated 9 years ago
- UDP reverse shells for *nix systems, plaintext and over DTLS.☆13Updated 6 years ago
- Cross-platform SOCKS5 proxy server program/library written in C that can also reverse itself over a firewall.☆31Updated 3 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆32Updated 3 years ago
- Shellcode process injector☆28Updated 5 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- LD_PRELOAD Linux rootkit (x86 & ARM)☆23Updated 6 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆51Updated 3 years ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- A Linux RAT in C☆35Updated 6 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- execute a PE in the address space of another PE aka process hollowing☆58Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- The Hunt for Malicious Strings☆13Updated 4 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated last year
- ☆10Updated 3 years ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- Resurrecting and updating the best log cleaner☆33Updated 10 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- DNS server for pentesters☆49Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago