A script to automate the creation of a "TOR" router on Debian based systems including Raspberry Pi and install the required tools to do so.
☆14Jan 12, 2021Updated 5 years ago
Alternatives and similar repositories for Str1k3-Tor-Router
Users that are interested in Str1k3-Tor-Router are comparing it to the libraries listed below
Sorting:
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- Web CTF CheatSheet 🐈☆34Apr 10, 2019Updated 6 years ago
- ☆30Dec 23, 2020Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆87Jun 27, 2020Updated 5 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- A tool to detect who's cutting the internet on your network☆13Apr 30, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- ☆11Jun 14, 2022Updated 3 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- my personal .bashrc files, with all my alias, tricks and ascii art☆13Oct 22, 2020Updated 5 years ago
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆35Updated this week
- vulnerability reporting tool powered by vulners.com and wpvulndb.com☆12Aug 31, 2022Updated 3 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Control CodeBug over Serial USB.☆10Dec 9, 2016Updated 9 years ago
- Cobalt Strike automation scripts collection☆12Oct 28, 2020Updated 5 years ago
- Find credit card info using BIN/IIN☆12Dec 29, 2025Updated 2 months ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- OpenClaw AI Trading Agent, based on EVPlus.AI data.☆34Updated this week
- Windows 10 PRO Activator - No more backdoors via loaders from China and neither you will need any crack anymore that is valid for a week …☆12Dec 22, 2018Updated 7 years ago
- ☆10Jan 27, 2017Updated 9 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- 🗄️ Auto-archive your webpages on the Internet Archive☆12Jun 18, 2024Updated last year
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago