SusmithKrishnan / torghost
TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
☆880Updated 3 years ago
Alternatives and similar repositories for torghost:
Users that are interested in torghost are comparing it to the libraries listed below
- Transparent proxy through Tor for Kali Linux OS☆1,080Updated 10 months ago
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,636Updated this week
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆467Updated 2 months ago
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆891Updated last year
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆628Updated 3 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,450Updated 6 months ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆909Updated 5 years ago
- MSFvenom Payload Creator (MSFPC)☆1,242Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆732Updated 4 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,038Updated 2 years ago
- Tool Information Gathering & social engineering Write By [Python,JS,PHP]☆503Updated 11 months ago
- Information gathering tool - OSINT☆1,251Updated 3 years ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,839Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,690Updated 4 months ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,417Updated last year
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,166Updated 2 years ago
- Reconnaissance Swiss Army Knife☆1,859Updated 4 years ago
- Find exploits in local and online databases instantly☆1,696Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆770Updated 9 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,708Updated 3 weeks ago
- parrot anonymous mode☆378Updated last year
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,136Updated last year
- Search for leaked credentials☆1,321Updated 3 years ago
- Automatically brute force all services running on a target.☆2,030Updated 6 months ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,084Updated this week
- Image Payload Creating/Injecting tools☆1,222Updated last year
- IP Tools To quickly get information about IP Address's, Web Pages and DNS records.☆485Updated 4 years ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,486Updated last year
- Crawler (Bot) searching for credential leaks on paste sites.☆648Updated 2 years ago
- 🔎 shodansploit > v1.3.0☆533Updated 2 years ago