skyformat99 / TinyTor
A tiny Tor client implementation (written in C).
☆14Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for TinyTor
- Self replicating and automatically spreading SSH worm that recovers login credentials☆42Updated last year
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 10 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A Linux RAT in C☆32Updated 6 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- The best way to send emails in Go.☆10Updated 3 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Polymorphic ELF Virus☆13Updated 2 years ago
- Execute Shellcode And Other Goodies From MMC☆12Updated 9 years ago
- Shellcode process injector☆27Updated 4 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Utility to inject honey tokens into lsass.☆27Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆56Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Updated 11 months ago
- Encryption Abstraction Layer and Utilities for ratnet☆17Updated 6 months ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 4 years ago
- DDoor - cross platform backdoor using dns txt records☆29Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆30Updated 4 years ago
- DNS logging, detection, ...☆15Updated 2 years ago
- Watches for trigger packets, runs commands or spawns a shell☆23Updated 5 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- A golang library designed to interact with Metasploit☆42Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆9Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆70Updated 5 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆14Updated last year
- Periodically check hashcat cracking progress and notify of success.☆11Updated 5 years ago
- An interactive mock C2 server☆13Updated last year