A fork of TorGhost, a little utilitly used to route all traffic through TOR.
☆52Feb 9, 2020Updated 6 years ago
Alternatives and similar repositories for torphantom
Users that are interested in torphantom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- Pentest tool com foco em teste de intrusão em redes wireless para Windows☆12Dec 24, 2019Updated 6 years ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Modular C2 server to tame your pack of wolves☆26Mar 14, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆29Jan 3, 2016Updated 10 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 6 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆910Mar 6, 2021Updated 5 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Jan 3, 2020Updated 6 years ago
- Docker + mitmproxy = ❤️☆28Jul 12, 2021Updated 4 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆79Apr 5, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Simple class for driving a st7735s LCD display in python 3☆11Nov 1, 2018Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆31Nov 4, 2024Updated last year
- ☆11Jul 3, 2021Updated 4 years ago
- A remix of Arch Linux ARM for Raspberry Pi 3 B+ built for HackRF and RTL-SDR☆36Jul 5, 2018Updated 7 years ago
- Public Exploits☆10Apr 6, 2021Updated 5 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PhotOSINT is an OSINT chrome extension for images and photos. It scans each webpage for images with EXIF data, while the user is browsing…☆59Jul 15, 2021Updated 4 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Jul 3, 2025Updated 9 months ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- Clone of master branch of mgwt☆92Oct 12, 2020Updated 5 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A github action to automatically submit your addon to the official Kodi repository when tagging☆12Mar 9, 2026Updated last month
- Ferramenta para criação de payloads HID (human interface device) para android sem nethunter ou rubber ducky☆18Aug 11, 2018Updated 7 years ago
- ☆11Mar 10, 2022Updated 4 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- ☆12Jan 20, 2025Updated last year
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago