violentshell / thorLinks
TCP Connection Destruction Tool.
☆13Updated 8 years ago
Alternatives and similar repositories for thor
Users that are interested in thor are comparing it to the libraries listed below
Sorting:
- Automated WiFi limit evasion☆119Updated 8 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- HTTP framework☆48Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Updated 8 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Check Diffie Hellman group prime parameter☆11Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 7 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- A program to send Ethernet PAUSE frames☆36Updated 8 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 5 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- ☆38Updated 8 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- A simple, but damn fast sinkhole☆64Updated 8 months ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- ☆56Updated 8 years ago