wille / relayawards
Gives medals to TOR relays
☆10Updated 8 years ago
Alternatives and similar repositories for relayawards:
Users that are interested in relayawards are comparing it to the libraries listed below
- Detect snooper on your system!☆83Updated 8 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- python tor client☆26Updated 9 years ago
- Detect passive activity in the Tor-network☆13Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 12 years ago
- ☆12Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- ☆140Updated 8 years ago
- Forces Chrome to use HTTP Strict Transport Security on all HTTPS connections☆16Updated 2 years ago
- ☆25Updated 7 years ago
- Script to bootstrap a Debian server to be a set-and-forget Tor relay☆145Updated last year
- Redirect Tor users from nginx☆9Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Automated OpenSSH hardening☆42Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Removes any instance of jRAT on your machine☆18Updated 8 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- ☆15Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- BitErrant☆58Updated 7 years ago
- Some NSE scripts to search information from routers☆37Updated 9 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated 11 months ago
- Panic button for protection against cold boot attacks☆140Updated 3 years ago