vvicaretti / stem-tortp
TorTP - Tor Transparent Proxy
☆19Updated 7 years ago
Alternatives and similar repositories for stem-tortp:
Users that are interested in stem-tortp are comparing it to the libraries listed below
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated 11 months ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Command-line utility to control Tor.☆89Updated last year
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- python tor client☆26Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- ☆32Updated 10 years ago
- Python wrapper for the OnionOO tor status API☆33Updated 7 years ago
- Mass scanning and fuzzing library☆49Updated 7 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆96Updated 3 years ago
- End-to-End encrypted Tor2Web gateway☆37Updated 4 years ago
- Hacker OPSEC☆95Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Post-Exploitation Framework☆75Updated 8 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Phishing attack w/HTML5 offline cache framework based on Squid proxy☆30Updated 13 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Secure/anonymous IRC-like chat using TOR hidden services☆40Updated 11 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 10 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆58Updated 9 years ago
- log file scrubber☆15Updated 6 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 11 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- A python based https remote access trojan for penetration testing☆85Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- ☆15Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- ☆9Updated 9 years ago