MehmetYukselSekeroglu / afteranonView external linksLinks
simple script to solve the problem of internet connection after ParrotOS-Anonsurf
☆15Apr 2, 2022Updated 3 years ago
Alternatives and similar repositories for afteranon
Users that are interested in afteranon are comparing it to the libraries listed below
Sorting:
- a script containing hacktools that make it easier to use for termux☆14Apr 23, 2022Updated 3 years ago
- iban üzerinden bilgi toplamak için işlemi basitleştiren basit python kodu☆12Apr 6, 2023Updated 2 years ago
- ☆22Aug 11, 2024Updated last year
- A comprehensive security scanning tool combining Nmap and SQLmap☆18Oct 1, 2025Updated 4 months ago
- Advanced professional graphical osint toolset with The Hive Remastered☆40Jul 3, 2024Updated last year
- A simple python3 code to calculate the similarity ratio of people's voices & detect the same person☆20Sep 15, 2023Updated 2 years ago
- Wifi Adapter TxPower Tuner is a Python tool for Linux that adjusts wireless Tx-Power. It offers a user-friendly interface to set Tx-Power…☆11Feb 5, 2024Updated 2 years ago
- This script allows you to manage VPN configurations with ease. It fetches VPN configurations from VPNBook and connects to your selected V…☆14Jun 13, 2025Updated 8 months ago
- ProxyHarvester is a bash script designed to scrape, deduplicate, and test SOCKS5 proxies from a variety of sources. Whether you're a deve…☆14Feb 5, 2024Updated 2 years ago
- SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.…☆28Feb 12, 2024Updated 2 years ago
- Nmap Network Scanning Türkçe Dökümantasyonu☆42Mar 5, 2025Updated 11 months ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Kaan Aslan tarafından verilen Online Gömülü Linux Sistemleri Geliştirme ve Programlama Kursu. Kurs 5 Mart 2024 tarihinde başlayacaktır. D…☆11Feb 29, 2024Updated last year
- ☆10Jul 8, 2024Updated last year
- ☆10Nov 15, 2025Updated 3 months ago
- Recursively extract urls from a web page for reconnaissance.☆12Jun 9, 2024Updated last year
- ☆10Aug 11, 2025Updated 6 months ago
- This repository will contain source codes from the Tradecraft improvement blog series☆14Mar 27, 2025Updated 10 months ago
- ☆13Mar 23, 2023Updated 2 years ago
- ☆10Aug 14, 2023Updated 2 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆51Dec 11, 2021Updated 4 years ago
- ☆13Jun 14, 2024Updated last year
- Windows Reverse TCP Shellcode ( 420 Bytes )☆21Feb 14, 2022Updated 4 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆12Nov 25, 2021Updated 4 years ago
- ☆11Oct 20, 2019Updated 6 years ago
- 📋 Guide to regular commit messages☆11Dec 24, 2024Updated last year
- Resources to accelerate deployment of bots to aide with an influx of COVID related questions☆16May 20, 2020Updated 5 years ago
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 3 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Notes and resources for the AD☆11Aug 2, 2022Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated last month
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- Yazılım Terimleri Sözlüğü, yazılım geliştirme, bilgisayar bilimleri ve teknoloji dünyasına dair kapsamlı, güncel ve anlaşılır açıklamalar…☆65Jan 23, 2026Updated 3 weeks ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago