violentshell / thorLinks
TCP Connection Destruction Tool.
☆13Updated 8 years ago
Alternatives and similar repositories for thor
Users that are interested in thor are comparing it to the libraries listed below
Sorting:
- Automated WiFi limit evasion☆119Updated 8 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- HTTP framework☆48Updated 8 years ago
- A program to send Ethernet PAUSE frames☆36Updated 9 years ago
- DHCP client disclosing less identifying information.☆61Updated 5 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 7 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- Check Diffie Hellman group prime parameter☆11Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Tool for scanning Cisco router products over SSH☆56Updated 10 years ago
- PingFS: Living in the Rain☆51Updated 9 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Pure Python SSL, TLS and DTLS library☆36Updated 7 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- IP Over QR Code Tunnel☆199Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 8 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Updated 6 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- strings for a Linux process' address space☆51Updated 12 years ago
- A python implementation of the Axolotl ratchet protocol.☆71Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆929Updated 9 years ago
- A Python port of the triplesec library.☆82Updated last year
- Detect silent (unwanted) changes to files on your system☆160Updated 5 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆100Updated 6 years ago