HackWithSumit / Tor-ProxychainsLinks
proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5, or HTTP(S) proxy.
☆33Updated last year
Alternatives and similar repositories for Tor-Proxychains
Users that are interested in Tor-Proxychains are comparing it to the libraries listed below
Sorting:
- Fastest tool to find username and password brute forcing.☆74Updated last year
- A Simple Script For SSH BruteForce☆36Updated last year
- An Simple PHP Webshell Manager to bypassed security system☆21Updated 11 months ago
- AutoExploiter Wordpress , Joomla , Drupal☆17Updated 7 years ago
- Steal telegram session Bypass 2fa☆18Updated 2 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆68Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆14Updated 2 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆36Updated last year
- An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.☆19Updated 3 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- my mini collection of exploits and scripts for pentest☆12Updated 2 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- xdebug 2.5.5 RCE exploit☆31Updated 6 months ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41Updated 3 years ago
- Leakix Searcher☆14Updated 4 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆71Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- A powerful and customizable ChatGPT-like interface, built for developers.☆115Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆80Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆21Updated last year
- a curated list of shodan dorks for finding sensitive data in shodan.io☆30Updated last year
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆44Updated 9 months ago