Introduction
Last updated
Was this helpful?
Last updated
Was this helpful?
is a series of tools that simplify the use of Tor for typical exploitation and post-exploitation tasks.
In exploitation and post-exploitation phases, the victim needs to access Tor. All of this tools have an embedded instance of Tor and they are completely separated from each other. In this way, you only need to upload one file to the victim in order to run the required action.
is written in , a language that stands out for its good performance. Also, makes use of the following libraries:
: Self-contained Tor from Go.
: Go API for using and controlling Tor.