violentshell / thor
TCP Connection Destruction Tool.
☆12Updated 8 years ago
Alternatives and similar repositories for thor:
Users that are interested in thor are comparing it to the libraries listed below
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 7 years ago
- Simple network sandbox for Unix and Windows☆20Updated 6 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Anonymous web chat server, built on top of Themis/WebThemis☆105Updated 8 years ago
- free crypto audit☆31Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆93Updated 9 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- ☆47Updated 8 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- HTTP framework☆48Updated 7 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Removed according to regulations☆35Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆25Updated 9 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- nocolon is an utf-8 compatible encoding that removes the need of colons in python files.☆123Updated 10 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 6 years ago