☆11Feb 20, 2015Updated 11 years ago
Alternatives and similar repositories for Proxy-Tools
Users that are interested in Proxy-Tools are comparing it to the libraries listed below
Sorting:
- ☆27Apr 16, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- Automatically exported from code.google.com/p/checkout4mac☆13Oct 24, 2016Updated 9 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- local mirror of your Github stars (including ALL branches)☆18Oct 7, 2020Updated 5 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- python modules to manipulate iptables rules☆49Mar 20, 2024Updated last year
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- A simple script to scrape a list of accounts or single account from Twitter into a neatly formatted Excel file.☆18Jan 25, 2023Updated 3 years ago
- Tool development for monitoring packets in local networks.☆18Nov 7, 2016Updated 9 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Feb 2, 2021Updated 5 years ago
- Python Pentest Tools☆22Dec 22, 2025Updated 2 months ago
- Common scripts, mainly for text processing and experimental control☆20Aug 24, 2012Updated 13 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84May 9, 2014Updated 11 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆23Mar 11, 2015Updated 10 years ago
- WordPress Gravity Forms Plugin 1.8.19 - Arbitrary File Upload☆33Dec 12, 2022Updated 3 years ago
- active / passive network scanner☆33Nov 8, 2023Updated 2 years ago
- free exploit framework written use python language version 3.3☆30Mar 31, 2018Updated 7 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Oct 30, 2018Updated 7 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- Examples for using the Pipl SEARCH API☆11Dec 19, 2023Updated 2 years ago
- ☆12Updated this week
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- AdWords Scripts developed by @AlbertoEstevesC☆12Jun 15, 2020Updated 5 years ago
- Scraping Amazon website using Proxies for extracting Mobile details☆13May 30, 2019Updated 6 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- Offline Digital Forensics Tool for Binary Files☆38Nov 6, 2017Updated 8 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Search hashes in different website.☆34Oct 3, 2020Updated 5 years ago
- Scrapes the obfuscated proxy list at proxylist.hidemyass.com☆32Sep 21, 2019Updated 6 years ago