skyformat99 / TinyTor
A tiny Tor client implementation (written in C).
☆15Updated 6 years ago
Alternatives and similar repositories for TinyTor:
Users that are interested in TinyTor are comparing it to the libraries listed below
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 9 months ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- My little precious collection of Linux 4.x kernel rootkits☆26Updated 9 months ago
- A Linux RAT in C☆33Updated 6 years ago
- UDP reverse shells for *nix systems, plaintext and over DTLS.☆13Updated 5 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆12Updated last year
- Modular C2 server to tame your pack of wolves☆12Updated 2 weeks ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Loads a program into a memfd and runs it.☆12Updated 2 years ago
- This is the ToRat client, a part of the ToRat Project.☆27Updated 5 years ago
- ☆12Updated last year
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆16Updated 5 years ago
- Shellcode process injector☆27Updated 4 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆54Updated 3 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- module for certexfil☆15Updated 2 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- ☆13Updated 4 years ago
- Pure Go rewrite of knockknock☆10Updated 2 years ago
- Reverse Windows shell over TLS☆18Updated 9 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆46Updated 2 years ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆28Updated 6 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year