violentshell / thorLinks
TCP Connection Destruction Tool.
☆13Updated 8 years ago
Alternatives and similar repositories for thor
Users that are interested in thor are comparing it to the libraries listed below
Sorting:
- PingFS: Living in the Rain☆51Updated 9 years ago
- A program to send Ethernet PAUSE frames☆36Updated 9 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- DHCP client disclosing less identifying information.☆61Updated 5 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 7 years ago
- HTTP framework☆48Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆29Updated 6 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- Simple network sandbox for Unix and Windows☆20Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- 🦈 Tool for visualizing packet captures.☆44Updated 5 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- A short script for setting up a Wireguard VPN and an Unbound DNS server☆38Updated 4 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Check Diffie Hellman group prime parameter☆11Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Crypto scanner☆43Updated 14 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆100Updated 6 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Safe cryptographic steganographic advanced filesystem☆13Updated last year
- A Python port of the triplesec library.☆82Updated last year
- A simple, but damn fast sinkhole☆64Updated 9 months ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- Ping IP addresses and domains in parallel to find the accessible and inaccessible ones.☆56Updated 2 years ago