TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
☆909Mar 6, 2021Updated 4 years ago
Alternatives and similar repositories for torghost
Users that are interested in torghost are comparing it to the libraries listed below
Sorting:
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆645Feb 9, 2022Updated 4 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,206Apr 18, 2024Updated last year
- An engine to make Tor network your default gateway☆2,289Feb 7, 2026Updated 3 weeks ago
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,821Feb 17, 2025Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,200Oct 9, 2023Updated 2 years ago
- Python antivirus evasion tool☆1,449Oct 21, 2023Updated 2 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,043Mar 17, 2024Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,900Jan 24, 2024Updated 2 years ago
- 🌰 An onion url inspector for inspecting deep web links.☆696Aug 4, 2022Updated 3 years ago
- Efficient and advanced man in the middle framework☆2,168Mar 23, 2023Updated 2 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,555Jul 31, 2024Updated last year
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆874Dec 28, 2018Updated 7 years ago
- venom - C2 shellcode generator/compiler/handler☆1,933Dec 9, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,645Oct 6, 2025Updated 4 months ago
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated 2 weeks ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,248Mar 9, 2020Updated 5 years ago
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,602Oct 4, 2024Updated last year
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,508Mar 26, 2024Updated last year
- Intelligent login bruteforcer.☆908Apr 27, 2023Updated 2 years ago
- ☆1,068Jan 13, 2023Updated 3 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆318Sep 26, 2022Updated 3 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,713Oct 8, 2023Updated 2 years ago
- operative framework is a rust investigation OSINT framework, you can interact with multiple targets, execute multiple modules, create lin…☆737May 17, 2025Updated 9 months ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Undetectable Windows Payload Generation☆1,609Nov 8, 2022Updated 3 years ago
- Starkiller is a Frontend for PowerShell Empire.☆1,618Feb 15, 2026Updated 2 weeks ago
- Wordpress Attack Suite☆972Feb 16, 2021Updated 5 years ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,090Nov 20, 2025Updated 3 months ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,779Oct 26, 2024Updated last year
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,896Aug 15, 2023Updated 2 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,246Jul 2, 2025Updated 7 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Exploitation Framework for Embedded Devices☆13,002Jun 10, 2025Updated 8 months ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,573Apr 21, 2025Updated 10 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,446May 6, 2024Updated last year