violentshell / thor
TCP Connection Destruction Tool.
☆12Updated 8 years ago
Alternatives and similar repositories for thor:
Users that are interested in thor are comparing it to the libraries listed below
- Automated WiFi limit evasion☆118Updated 8 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- Safe cryptographic steganographic advanced filesystem☆13Updated last year
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- A foreign function interface to use Wireshark within Python☆27Updated 11 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- A program to send Ethernet PAUSE frames☆36Updated 8 years ago
- HTTP framework☆48Updated 7 years ago
- Just a simple radare2 Jupyter kernel☆110Updated 7 years ago
- In browser VNC client through websockets☆30Updated 13 years ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆29Updated 5 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Simple network sandbox for Unix and Windows☆20Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Removed according to regulations☆35Updated 7 years ago
- A Python port of the triplesec library.☆82Updated last year
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Check Diffie Hellman group prime parameter☆11Updated 9 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 7 years ago
- Clang SA checkers developed as part of the Melange framework☆17Updated 9 years ago
- Detect silent (unwanted) changes to files on your system☆160Updated 4 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago