Debajyoti0-0 / ToriFYView external linksLinks
A tool to automatically redirect all traffic through the TOR and change the IP every 0 to x seconds. And provides a custom MAC address. </>
☆100Jan 13, 2026Updated last month
Alternatives and similar repositories for ToriFY
Users that are interested in ToriFY are comparing it to the libraries listed below
Sorting:
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆67Jul 25, 2023Updated 2 years ago
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆28Sep 1, 2023Updated 2 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆35Dec 2, 2021Updated 4 years ago
- bugreport☆13May 19, 2019Updated 6 years ago
- A tool that collects information from IP address☆30May 30, 2021Updated 4 years ago
- Awesome-AndroidROM: Explore the world of OEM Android Experiences! Dive into a comprehensive collection of official Android skins from ma…☆18Sep 29, 2024Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- Information gathering tool.☆10Apr 24, 2021Updated 4 years ago
- Actual good v3 onion links☆14Jan 19, 2026Updated 3 weeks ago
- Linux network and security sandbox with support for kernel exploit protection as well as VPN and proxy chaining☆15Mar 30, 2025Updated 10 months ago
- Posion: es un script capaz de escanear hosts, MAC spoofing, realizar ataque de SYNflood y sniffear FTP.☆13Jun 23, 2022Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Feb 1, 2023Updated 3 years ago
- light weight dos attack tool to attack to a single port to any network.☆31May 30, 2023Updated 2 years ago
- Image recon is a tool used to find the social media accounts associated with the uploading image.☆19Dec 18, 2020Updated 5 years ago
- A Powerful DDoS Tool For making Any Service DOWN, Also Included Proxies and Socks for Anonymization☆56May 25, 2023Updated 2 years ago
- This is a collection of useful websites and tools/software for programming.☆18May 25, 2025Updated 8 months ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Jun 30, 2020Updated 5 years ago
- All the info you need.☆21Aug 14, 2023Updated 2 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- Sent multiple emails at a time.☆19Oct 14, 2022Updated 3 years ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆16Aug 20, 2025Updated 5 months ago
- A complete package of all Deterrence Dispensed public releases in one convinient file.☆17Feb 7, 2021Updated 5 years ago
- UnknSMS es un simple script que utiliza la API de https://textbelt.com/ para enviar mensajes de texto (SMS) a un número telefónico de cua…☆40May 10, 2022Updated 3 years ago
- ☆20Jun 16, 2023Updated 2 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Regular expression for matching .onion Tor links (v2 & v3).☆18Jan 5, 2023Updated 3 years ago
- Remote Email Keylogger☆14Jun 2, 2022Updated 3 years ago
- A host-based IDS and network monitoring system (My graduation project)☆25Jul 6, 2021Updated 4 years ago
- ☆22Jan 11, 2026Updated last month
- Menú de herramientas para análisis de malware y virus informáticos.☆19Feb 3, 2026Updated 2 weeks ago
- Minetest mod and Python script to generate a Minetest world from a GeoTIFF image☆25Jun 1, 2019Updated 6 years ago
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- An automated phishing tool with templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse…☆107Oct 23, 2022Updated 3 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 8 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆112Sep 17, 2025Updated 5 months ago