violentshell / thor
TCP Connection Destruction Tool.
☆12Updated 8 years ago
Alternatives and similar repositories for thor:
Users that are interested in thor are comparing it to the libraries listed below
- A program to send Ethernet PAUSE frames☆36Updated 8 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- ☆54Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Software to monitor radio frequency activity☆18Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- A Python port of the triplesec library.☆81Updated last year
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- PingFS: Living in the Rain☆49Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- Access domain information via python and command line.☆16Updated 11 months ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆29Updated 5 years ago
- Open Source Your Password (Mismanagement)!☆115Updated 7 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- This is a program for a staff timesheet.☆32Updated 8 years ago
- CERT Tapioca for MITM network analysis☆183Updated 10 months ago
- strings for a Linux process' address space☆51Updated 11 years ago
- Store arbitrary files inside PNGs to overcome nonsensical file type restrictions☆30Updated 7 years ago
- Detect and prevent crypto malware as it encrypts files☆69Updated 3 years ago
- A collection of mind fucking trolling hacks☆75Updated 8 years ago
- Pure Python SSL, TLS and DTLS library☆36Updated 7 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago