🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.
☆58Apr 14, 2025Updated 11 months ago
Alternatives and similar repositories for mapache-anon
Users that are interested in mapache-anon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆20Apr 27, 2025Updated 10 months ago
- Herramienta para hacking wifi con múltiples opciones.☆44Aug 12, 2024Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- Herramienta en desarrollo la cual busca la sencillez a la hora de hacer PenTesting Ethicos. [NO ME HAGO RESPONSABLE DEL MAL USO DE ESTA H…☆11Aug 1, 2023Updated 2 years ago
- AESRevShell is a highly secure reverse shell tool that uses AES-GCM (256-bit) encryption and ECDH (Curve P-256) to ensure encrypted and p…☆16Dec 1, 2025Updated 3 months ago
- ☆18May 20, 2025Updated 10 months ago
- reverse shell, Bypass windows defender firewall☆45Nov 13, 2024Updated last year
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last week
- Herramienta hecha en Bash para rastrear una IP Pública.☆21Mar 30, 2021Updated 4 years ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆25Jan 19, 2026Updated 2 months ago
- ¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos …☆21Apr 2, 2025Updated 11 months ago
- Herramienta dirigida exclusivamente al uso de Fuerza Bruta y Ataques de Diccionario a varios tipos de Objetivos. [NO ME HAGO RESPONSABLE …☆58Sep 1, 2023Updated 2 years ago
- Vulnerable Pentesting Lab Environment☆35Aug 3, 2021Updated 4 years ago
- Automatic tool to find Google Dorks☆36Oct 25, 2024Updated last year
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- A Programmer☆14Dec 20, 2025Updated 3 months ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Herramienta enfocada a Blindar/Proteger nuestro equipo para que todo rastro que deje en Internet o en Redes Locales sea Falso e Inrasteab…☆29Sep 1, 2023Updated 2 years ago
- Code for the AWS IoT Playlist videos☆11Dec 17, 2022Updated 3 years ago
- Keylogger for Windows that goes unnoticed by the antivirus☆30Dec 4, 2024Updated last year
- kaminsky-attack - DNS cache poisoning with extremly high performance☆18Jul 1, 2021Updated 4 years ago
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆68Jun 6, 2025Updated 9 months ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆27Aug 12, 2024Updated last year
- wp-config-scan☆81Sep 6, 2023Updated 2 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆19Aug 26, 2025Updated 6 months ago
- A Collection of 88x31px GIFs☆14Jun 21, 2024Updated last year
- Datasets for cybersecurity☆16Aug 12, 2025Updated 7 months ago
- SImple script, que nos permite suplantar cualquier correo electronico☆27Aug 2, 2020Updated 5 years ago
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆61Feb 26, 2024Updated 2 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆17Feb 2, 2025Updated last year
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆51Feb 9, 2026Updated last month
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 11 months ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆46Oct 26, 2025Updated 4 months ago
- Troyano en python indetectable para windows 10.☆20Mar 4, 2026Updated 2 weeks ago
- A modular and beginner-friendly toolkit to set up your Termux environment with essential tools in one click.