TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
☆910Mar 6, 2021Updated 5 years ago
Alternatives and similar repositories for torghost
Users that are interested in torghost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆645Feb 9, 2022Updated 4 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,215Apr 18, 2024Updated last year
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,851Feb 17, 2025Updated last year
- An engine to make Tor network your default gateway☆2,318Updated this week
- A fork of TorGhost, a little utilitly used to route all traffic through TOR.☆52Feb 9, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 🌰 An onion url inspector for inspecting deep web links.☆702Aug 4, 2022Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,213Oct 9, 2023Updated 2 years ago
- A Phishing Dropper designed to Pentest.☆274May 15, 2017Updated 8 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- Script to redirect all traffic through tor network including dns queries for anonymizing entire system☆206Feb 25, 2024Updated 2 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,116Mar 17, 2024Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago
- Python antivirus evasion tool☆1,449Oct 21, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,816Oct 6, 2025Updated 6 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,907Jan 24, 2024Updated 2 years ago
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,575Jul 31, 2024Updated last year
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,530Mar 26, 2024Updated 2 years ago
- Intelligent login bruteforcer.☆914Apr 27, 2023Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,255Mar 9, 2020Updated 6 years ago
- Wordpress Attack Suite☆974Feb 16, 2021Updated 5 years ago
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Privilege Escalation Project - Windows / Linux / Mac☆2,604Oct 4, 2024Updated last year
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆319Sep 26, 2022Updated 3 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,793Oct 26, 2024Updated last year
- ☆1,080Jan 13, 2023Updated 3 years ago
- Most advanced XSS scanner.☆14,872Apr 26, 2025Updated 11 months ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆489Jul 31, 2025Updated 8 months ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,001Jan 19, 2024Updated 2 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,950Aug 15, 2023Updated 2 years ago
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,643Apr 3, 2026Updated last week
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- venom - C2 shellcode generator/compiler/handler☆1,941Dec 9, 2023Updated 2 years ago
- NXcrypt - 'python backdoor' framework☆368Jun 26, 2017Updated 8 years ago
- The New Hacking Framework☆707Apr 5, 2021Updated 5 years ago
- The LAZY script will make your life easier, and of course faster.☆4,319Aug 28, 2021Updated 4 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago