sophron / BARLinks
Broadcast Anonymous Routing - A scalable system for efficient anonymous communications
☆76Updated 9 years ago
Alternatives and similar repositories for BAR
Users that are interested in BAR are comparing it to the libraries listed below
Sorting:
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- YAPDNS☆39Updated 10 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 3 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 9 years ago
- ☆12Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Updated 11 years ago
- SPIP (CMS) Scanner for penetration testing purpose written in Python☆72Updated 11 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- wifitap updated for BT5r3☆153Updated 8 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- a MITM attack tool☆85Updated 10 years ago