0xSolanaceae / proXXyLinks
A super simple asynchronous multithreaded proxy scraper; scraping & checking ~500k HTTP, HTTPS, SOCKS4, & SOCKS5 proxies.
☆154Updated last month
Alternatives and similar repositories for proXXy
Users that are interested in proXXy are comparing it to the libraries listed below
Sorting:
- Tool designed for fetching, validating, and storing working proxies.☆250Updated 6 months ago
- Perfect scripts for all the hustle we have with mass-mailing☆108Updated last month
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆45Updated last year
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆32Updated this week
- SMTP and IMAP checker / cracker for mailpass combolists with a user-friendly GUI, automated inbox test and many more features.☆98Updated 3 years ago
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆202Updated 2 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆41Updated 10 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- SMTP checker to check Mail Access via SMTP☆41Updated 4 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆52Updated 11 months ago
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆41Updated last year
- Tool to parse Stealer Logs.☆20Updated 2 years ago
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆18Updated 5 months ago
- A custom Google search (to bypass some limitations on google and VPNs)☆113Updated 2 years ago
- A powerful open-source proxy scraper☆97Updated this week
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆50Updated 8 months ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆93Updated 2 years ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆39Updated 4 months ago
- xSMTP 🦟 Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.☆76Updated 2 years ago
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆146Updated 10 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆110Updated 5 months ago
- Bypass 403☆164Updated 7 months ago
- Discover Domains Associated with a Reverse IP Lookup☆33Updated 7 months ago
- MASS SMTP VALID INVALID CHECKER.☆21Updated 11 months ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated 2 years ago
- Spearphishing tools, generate masqueraded pocket executable☆105Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Gecko Backdoor is a most powerful web php backdoor.☆127Updated 2 months ago
- PrivacyNet: Privacy Network☆50Updated last year
- A tool to check the correctness of email and password☆19Updated last year