violentshell / thor
TCP Connection Destruction Tool.
☆12Updated 8 years ago
Alternatives and similar repositories for thor
Users that are interested in thor are comparing it to the libraries listed below
Sorting:
- Automated WiFi limit evasion☆118Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Safe cryptographic steganographic advanced filesystem☆13Updated last year
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆29Updated 5 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- ☆56Updated 7 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A program to send Ethernet PAUSE frames☆36Updated 8 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- Simple network sandbox for Unix and Windows☆20Updated 6 years ago
- Killer Windows Installer - An alternative to WDS☆26Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A Python port of the triplesec library.☆82Updated last year
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 7 years ago
- HTTP framework☆48Updated 7 years ago
- A pythonic wrapper over `atd` to schedule deletion of files/directories.☆53Updated 7 years ago
- Passive network observation tool☆30Updated 6 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- PingFS: Living in the Rain☆49Updated 9 years ago
- The CLI RFC reader☆74Updated 2 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- Removed according to regulations☆35Updated 7 years ago