Giter Site home page Giter Site logo

tai-rex's Projects

torcrawl.py icon torcrawl.py

Crawl and extract (regular or onion) webpages through TOR network

torhunter icon torhunter

Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion

tox icon tox

toxcore implementation in Rust

tox-node icon tox-node

A server application to run tox node written in pure Rust

triton icon triton

Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a dynamic taint engine, AST representations of the x86, x86-64, ARM32 and AArch64 Instructions Set Architecture (ISA), SMT simplification passes, an SMT solver interface and, the last but not least, Python bindings.

trustedpath-uacbypass-bof icon trustedpath-uacbypass-bof

Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.exe" by using DCOM object.

tunna icon tunna

Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.

turbodiff icon turbodiff

Turbodiff is a binary diffing tool developed as an IDA plugin. It discovers and analyzes differences between the functions of two binaries.

twiti icon twiti

This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)

ukn0w icon ukn0w

Custom Kali Linux running in docker with wireguard and other things

undefender icon undefender

Killing your preferred antimalware by abusing native symbolic links and NT paths.

unicorn icon unicorn

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.

upsilon icon upsilon

Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used

upx icon upx

UPX - the Ultimate Packer for eXecutables

urlbuster icon urlbuster

Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.

vajra icon vajra

Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.

veil icon veil

Veil 3.1.X (Check version info in Veil at runtime)

viper icon viper

Intranet pentesting tool with webui 开源图形化内网渗透工具

vipermonkey icon vipermonkey

A VBA parser and emulation engine to analyze malicious macros.

vshell icon vshell

vshell 是一款go编写的主机管理工具,使用蚁剑控制台及插件管理主机 vshell is a Remote Administation tool written in Go (RAT),use AntSword control host

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.