TorRouters / THOR
The Hardware Onion Router
☆33Updated last year
Related projects ⓘ
Alternatives and complementary repositories for THOR
- Proof of concept denial of service over TOR stress test tool☆35Updated 6 years ago
- This informative guide offers essential tips to avoid legal trouble with law enforcement by educating readers on their rights and ways to…☆17Updated 3 months ago
- Whoami is a privacy tool developed to keep you anonymous on Kali Linux at the highest level.☆8Updated 2 years ago
- (Network Metadata Privacy) MAC Address spoofer with bonus combo (options): hostname + signal spoofer - *no disconnects!* Privacy Changing…☆49Updated 9 months ago
- Blacklist for Crypto Wallet scams and Newly Registered Domains☆9Updated 2 weeks ago
- An Advanced Tool to Crack Any Password Protected ZIP File With different Techniques. A very Beginner Friendly Script For Newbies.☆94Updated last year
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆16Updated 9 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆25Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆24Updated last month
- Keygen for the ATM Malware Cutlet Maker☆75Updated 3 years ago
- Create Containerized Clearnet Proxies☆29Updated 5 years ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆64Updated 2 years ago
- A tool that sorts out the information found on Google.☆36Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆35Updated last year
- A lightweight ducky script generator written in python.☆30Updated 3 years ago
- Fully undetected grabber (grabs wallets, passwords, cookies, modifies discord client etc.)☆33Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆69Updated 10 months ago
- Automated sqlmap☆15Updated 2 years ago
- A CRYPTOJACKING PROGRAM (MALWARE) >:)☆25Updated 3 years ago
- Some Links to surf on the DarkWeb☆39Updated 2 years ago
- The Life Operational Security (OpSec) Guide provides invaluable insights and actionable recommendations for individuals seeking to enhanc…☆89Updated 7 months ago
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆11Updated last year
- GovCracker is the best Wrapper and GUI for Hashcat, John the Ripper, PRINCE, Maskprocessor, Wordlister, CUPP, etc.☆53Updated last year
- Embedding executable files in PDF Documents☆44Updated 5 years ago
- Well, I have created this shit for educational pruposes (I think)☆34Updated 2 years ago