Sophisticated proxy scraper and checker
☆82Mar 2, 2026Updated this week
Alternatives and similar repositories for ProxyGather
Users that are interested in ProxyGather are comparing it to the libraries listed below
Sorting:
- ☆11Dec 17, 2024Updated last year
- ☆16Jul 21, 2025Updated 7 months ago
- nathack☆12Oct 13, 2023Updated 2 years ago
- Dumper — This is a CLI utility for creating backups databases of various types (PostgreSQL, MySQL and etc.)☆89Feb 15, 2026Updated 2 weeks ago
- Aura-sec is a simple, fast, and extensible network port scanner built with Python. Designed for security professionals, students, and ent…☆22Feb 26, 2026Updated last week
- This repository provides a technical summary and comparison of major Solana stake pools as of June 2025.☆16Updated this week
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- RANSOMWARE BUILDER FOR WINDOWS☆10Feb 26, 2024Updated 2 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- Slightly outdated solver for Threat Metrix anti-bot☆24Dec 11, 2025Updated 2 months ago
- micromize is a security hardening tool designed to detect and break the post-exploit kill chain for containerized applications, leveragin…☆44Updated this week
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Bitcoin Hourly OHLCV with 70+ Technical Indicators | Daily Updated Dataset for ML & Trading Analysis☆18Updated this week
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Working funcaptcha solver☆14May 15, 2025Updated 9 months ago
- The accountability protocol for the autonomous AI economy.☆22Updated this week
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- ☆33Oct 19, 2025Updated 4 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- NTFS Security Descriptor Stream ($Secure:$SDS) parser☆14Jan 9, 2023Updated 3 years ago
- Search for secrets left in git history☆14Sep 22, 2018Updated 7 years ago
- A next-generation AI-powered algorithmic trading platform supporting strategy backtesting, live/paper trading, parameter optimization, an…☆34Jan 2, 2026Updated 2 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago