sophron / BARLinks
Broadcast Anonymous Routing - A scalable system for efficient anonymous communications
☆76Updated 9 years ago
Alternatives and similar repositories for BAR
Users that are interested in BAR are comparing it to the libraries listed below
Sorting:
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
- ☆12Updated 9 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- YAPDNS☆39Updated 10 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- ☆27Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- A python based https remote access trojan for penetration testing☆84Updated 10 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- Canari local transforms pcap file analysis☆31Updated 11 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago