HackWithSumit / Tor-Proxychains
proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5, or HTTP(S) proxy.
☆31Updated last year
Alternatives and similar repositories for Tor-Proxychains:
Users that are interested in Tor-Proxychains are comparing it to the libraries listed below
- xdebug 2.5.5 RCE exploit☆30Updated 2 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated 2 years ago
- Fastest tool to find username and password brute forcing.☆72Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- A Simple Script For SSH BruteForce☆36Updated last year
- ⚡ Scan World FTP Servers and Steal Their Data 🌍☆35Updated 2 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Reverse And Dorking Tools☆25Updated 3 years ago
- Perform With Massive Wordpress Enumeration☆11Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆63Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 2 years ago
- DDos attack☆8Updated 2 years ago
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆64Updated last year
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆32Updated 5 months ago
- PHP lab to test captcha bypassing☆31Updated last year
- AutoExploiter Wordpress , Joomla , Drupal☆17Updated 7 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, …☆69Updated 3 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 2 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆22Updated last year
- Using open Adb ports we can exploit a Andriod Device☆20Updated 5 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 4 months ago