HackWithSumit / Tor-ProxychainsLinks
proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5, or HTTP(S) proxy.
☆33Updated 2 years ago
Alternatives and similar repositories for Tor-Proxychains
Users that are interested in Tor-Proxychains are comparing it to the libraries listed below
Sorting:
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- Fastest tool to find username and password brute forcing.☆76Updated last year
- ☆14Updated this week
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- hacker Tools cross-platform desktop App, support windows/MacOS/LInux ....☆41Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Updated 2 years ago
- An Simple PHP Webshell Manager to bypassed security system☆22Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated 2 years ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Updated 2 months ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆47Updated 2 years ago
- Keylogger using pynput + mail sender☆55Updated 5 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- contains Evil Files separated from PyHTools project to comply with PyPi's acceptable use policy☆21Updated 3 weeks ago
- CloudFlare bypass, Breacher, FindPerson, GeneratorIP☆36Updated 2 years ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆80Updated last year
- PHP lab to test captcha bypassing☆30Updated last year
- phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, …☆76Updated 4 years ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆34Updated last year
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆13Updated 10 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆27Updated 2 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆56Updated 2 months ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Updated 5 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- This is a simple tool for openbullet configs☆23Updated 4 years ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago