A Simple Proxy Scraper
☆33Mar 18, 2019Updated 6 years ago
Alternatives and similar repositories for Proxies
Users that are interested in Proxies are comparing it to the libraries listed below
Sorting:
- A simple Golang program to collect proxies☆13Aug 9, 2019Updated 6 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- Secure FTP☆11Jul 28, 2018Updated 7 years ago
- Automatically Scans For Default Networks & Guess The Password☆14Dec 9, 2016Updated 9 years ago
- A URL shortener☆19Feb 4, 2019Updated 7 years ago
- A simple DOS attack tool☆14Sep 21, 2019Updated 6 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- A Simple Ransomware☆52Jan 5, 2024Updated 2 years ago
- Automatic Wifi Cracker. Uses Airodump, Aircrack, Aireplay☆73Aug 19, 2017Updated 8 years ago
- An encrypted notebook☆33May 2, 2023Updated 2 years ago
- A simple phishing tool that can phish almost any website☆76Nov 6, 2018Updated 7 years ago
- Inflate YouTube Views☆31May 1, 2018Updated 7 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Oct 26, 2018Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- Get or generate a password list☆127Jun 22, 2022Updated 3 years ago
- Remote Access Tool☆617May 1, 2023Updated 2 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Aug 13, 2017Updated 8 years ago
- A collection of tools for modding Android applications.☆15Nov 1, 2019Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 5 years ago
- Using Social Engineering To Obtain WiFi Passwords☆101Jan 12, 2018Updated 8 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Oct 3, 2018Updated 7 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 8 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- Brute Force For Facebook,Instagram & Twitter☆480Oct 1, 2020Updated 5 years ago
- An advanced reverse shell written in Python3.☆21Oct 30, 2020Updated 5 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- Wireshark dissector for Broadcom specific H4 diagnostic commands☆25Jan 6, 2023Updated 3 years ago
- Brute force multiple accounts at once☆228Nov 6, 2018Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Custom security distro for remote penetration testing☆55Mar 26, 2021Updated 4 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- ☆20Aug 19, 2017Updated 8 years ago
- Modification of help_crack.py from https://wpa-sec.stanev.org/☆22Oct 21, 2024Updated last year
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- A browser based text editor - for local files. Your secret weapon against lag and SSH.☆20Sep 16, 2016Updated 9 years ago
- TorChat implementation for Android☆41Jan 22, 2013Updated 13 years ago