HackWithSumit / Tor-Proxychains
proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, SOCKS5, or HTTP(S) proxy.
☆29Updated last year
Alternatives and similar repositories for Tor-Proxychains:
Users that are interested in Tor-Proxychains are comparing it to the libraries listed below
- Fastest tool to find username and password brute forcing.☆70Updated last year
- A Simple Script For SSH BruteForce☆36Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆53Updated 11 months ago
- xdebug 2.5.5 RCE exploit☆29Updated 2 weeks ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 3 months ago
- hacking tools☆14Updated 2 years ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆27Updated 3 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 2 months ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆35Updated last year
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆20Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated last year
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆13Updated last year
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆74Updated 6 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆63Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆19Updated last year
- ☆12Updated this week
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆29Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- Steal telegram session Bypass 2fa☆16Updated 2 years ago
- Gmail/GSuite account enumeration tool☆51Updated 10 months ago
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- PassBreaker☆55Updated 9 months ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆101Updated 11 months ago
- a curated list of shodan dorks for finding sensitive data in shodan.io☆27Updated 6 months ago
- Nmap & SQL injection automation tool☆29Updated 3 months ago