Script to redirect all traffic through tor network including dns queries for anonymizing entire system
☆202Feb 25, 2024Updated 2 years ago
Alternatives and similar repositories for torctl
Users that are interested in torctl are comparing it to the libraries listed below
Sorting:
- Manage the metasploit framework database☆16Nov 8, 2020Updated 5 years ago
- a more secure way to force programs to exclusively use tor network☆208Apr 28, 2022Updated 3 years ago
- AppArmor profile for The Tor Browser Bundle (TBB) - https://www.whonix.org/wiki/AppArmor - for better security (hardening).☆21Sep 19, 2025Updated 5 months ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- A tool that allows you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) to increase pr…☆305Jan 18, 2024Updated 2 years ago
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆125Apr 6, 2020Updated 5 years ago
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 6 years ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- Encrypted DNS profiles for macOS and iOS☆10Jul 26, 2021Updated 4 years ago
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆909Mar 6, 2021Updated 4 years ago
- A very fast and smart web directory and file enumeration tool written in C.☆141Sep 15, 2025Updated 5 months ago
- The first public explorer for HCB transactions and organizations.☆28Updated this week
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- BetterDiscord plugin for automatic time tracking and stats about your Discord usage☆15Feb 25, 2024Updated 2 years ago
- Python botnet☆12Aug 15, 2015Updated 10 years ago
- Boosty Downloader (boosty-dl) — the ultimate tool for mirroring Boosty channels into a local media library, fully compatible with Plex an…☆10Jan 7, 2026Updated last month
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Nov 7, 2020Updated 5 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- Version 2 with new design☆10Apr 10, 2025Updated 10 months ago
- Start to a project I never finished, Users are verified and checked before accessing the main page.☆10Sep 28, 2023Updated 2 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- Transparent proxy through Tor with optionally DNSCrypt and Anonymized-DNS feature enabled.☆12Jul 23, 2024Updated last year
- CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool☆42Dec 5, 2025Updated 2 months ago
- Official repository of OnionCat, the VPN adapter for Tor and I2P.☆254Oct 4, 2025Updated 4 months ago
- Script for building Tor for Android from source using Gitlab CI / CD☆12Feb 1, 2026Updated last month
- BlackArch menu, theme, and config for Fluxbox.☆17Mar 14, 2023Updated 2 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- ☆17May 2, 2024Updated last year
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- A set of Ansible playbooks to build and maintain your own private cloud☆11Mar 2, 2025Updated last year
- Maltego transform for hunter.io☆40Apr 28, 2021Updated 4 years ago
- dogecoin-mining botnet for windows☆15Mar 17, 2015Updated 10 years ago
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆487Jul 31, 2025Updated 7 months ago
- ☆19Aug 26, 2020Updated 5 years ago
- Nqntnqnqmb transform maltego☆24Sep 19, 2020Updated 5 years ago