sophron / BAR
Broadcast Anonymous Routing - A scalable system for efficient anonymous communications
☆76Updated 8 years ago
Alternatives and similar repositories for BAR:
Users that are interested in BAR are comparing it to the libraries listed below
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆198Updated 9 years ago
- A python based https remote access trojan for penetration testing☆85Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- YAPDNS☆39Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- Metasploit Usage Wiki☆49Updated 9 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- ☆12Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆127Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- ssh session type for metasploit☆98Updated 2 years ago