TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
☆910Mar 6, 2021Updated 5 years ago
Alternatives and similar repositories for torghost
Users that are interested in torghost are comparing it to the libraries listed below
Sorting:
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆644Feb 9, 2022Updated 4 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,212Apr 18, 2024Updated last year
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,831Feb 17, 2025Updated last year
- An engine to make Tor network your default gateway☆2,312Mar 13, 2026Updated last week
- 🌰 An onion url inspector for inspecting deep web links.☆701Aug 4, 2022Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,211Oct 9, 2023Updated 2 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆205Feb 25, 2024Updated 2 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,086Mar 17, 2024Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 2 years ago
- Python antivirus evasion tool☆1,449Oct 21, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,721Oct 6, 2025Updated 5 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,902Jan 24, 2024Updated 2 years ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,566Jul 31, 2024Updated last year
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,528Mar 26, 2024Updated last year
- Intelligent login bruteforcer.☆912Apr 27, 2023Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,252Mar 9, 2020Updated 6 years ago
- Wordpress Attack Suite☆973Feb 16, 2021Updated 5 years ago
- AntiVirus Evasion Tool☆1,747Apr 23, 2025Updated 10 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,600Oct 4, 2024Updated last year
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆318Sep 26, 2022Updated 3 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,779Oct 26, 2024Updated last year
- ☆1,075Jan 13, 2023Updated 3 years ago
- Most advanced XSS scanner.☆14,822Apr 26, 2025Updated 10 months ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆489Jul 31, 2025Updated 7 months ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,003Jan 19, 2024Updated 2 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,928Aug 15, 2023Updated 2 years ago
- Exploitation Framework for Embedded Devices☆13,028Mar 2, 2026Updated 2 weeks ago
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,613Mar 4, 2026Updated 2 weeks ago
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- NXcrypt - 'python backdoor' framework☆366Jun 26, 2017Updated 8 years ago
- The New Hacking Framework☆706Apr 5, 2021Updated 4 years ago
- The LAZY script will make your life easier, and of course faster.☆4,314Aug 28, 2021Updated 4 years ago
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,722Oct 8, 2023Updated 2 years ago
- Undetectable Windows Payload Generation☆1,609Nov 8, 2022Updated 3 years ago