skyformat99 / TinyTorLinks
A tiny Tor client implementation (written in C).
☆17Updated 6 years ago
Alternatives and similar repositories for TinyTor
Users that are interested in TinyTor are comparing it to the libraries listed below
Sorting:
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- arp-poison (aka arp spoof) tool☆40Updated 12 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆15Updated 4 years ago
- Shellcode process injector☆27Updated 5 years ago
- dragon.c: sniffing, non binding, reverse down/exec, portknocking service * Based on cd00r.c by fx@phenoelit.de and helldoor.c by drizzt@…☆9Updated 11 years ago
- kfile-over-icmp is an LKM for stealth sending of files over ICMP communication.☆17Updated 4 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- A Linux RAT in C☆34Updated 6 years ago
- A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast☆7Updated last month
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- inject and run code into arbitrary process (x86 and x64)☆13Updated 3 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Updated 9 years ago
- reverse proxy server☆21Updated 8 years ago
- UDP reverse shells for *nix systems, plaintext and over DTLS.☆13Updated 5 years ago
- Watches for trigger packets, runs commands or spawns a shell☆24Updated 6 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 7 years ago
- List of possible Linux backdoors☆14Updated 4 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Updated 3 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 10 months ago