violentshell / thor
TCP Connection Destruction Tool.
☆12Updated 8 years ago
Alternatives and similar repositories for thor:
Users that are interested in thor are comparing it to the libraries listed below
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- HTTP framework☆48Updated 7 years ago
- strings for a Linux process' address space☆51Updated 11 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- return-to-abort() - Using code introspection to prevent stack-smashing☆37Updated 4 years ago
- Recon system hardening scanner☆47Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Safe cryptographic steganographic advanced filesystem☆13Updated last year
- RFC 6238 TOTP + knockd = awesome!☆56Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A program to send Ethernet PAUSE frames☆35Updated 8 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆114Updated 4 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Detect and prevent crypto malware as it encrypts files☆69Updated 3 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- Create an intuitive and interactive graph of a client's IP traffic☆28Updated 7 years ago
- A command line Hash Identifying tool.☆101Updated 5 years ago
- ☆30Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆93Updated 8 years ago