A port of ParrotSec's stealth and anonsurf modules to Kali Linux
☆1,868Feb 17, 2025Updated last year
Alternatives and similar repositories for kali-anonsurf
Users that are interested in kali-anonsurf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- parrot anonymous mode☆427Dec 19, 2023Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,219Apr 18, 2024Updated 2 years ago
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆318Sep 26, 2022Updated 3 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,193Mar 17, 2024Updated 2 years ago
- Automatically install all Kali linux tools☆5,227Apr 29, 2024Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Efficient and advanced man in the middle framework☆2,180Mar 23, 2023Updated 3 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,598Jul 31, 2024Updated last year
- Create multiple TOR instances with a load-balancing.☆1,160Nov 19, 2024Updated last year
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆911Mar 6, 2021Updated 5 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,711Updated this week
- Attack Surface Management Platform☆9,727Apr 29, 2026Updated last week
- An engine to make Tor network your default gateway☆2,327Updated this week
- Phishing Tool & Information Collector☆4,719Oct 29, 2024Updated last year
- Inject malicious code into *.debs☆287Apr 26, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The LAZY script will make your life easier, and of course faster.☆4,321Aug 28, 2021Updated 4 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,334Jan 23, 2018Updated 8 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆877Dec 28, 2018Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,214Oct 9, 2023Updated 2 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,828Oct 21, 2024Updated last year
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆12,021Aug 8, 2024Updated last year
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,274Oct 13, 2025Updated 6 months ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆645Feb 9, 2022Updated 4 years ago
- The Rogue Access Point Framework☆14,562Feb 4, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,551Nov 1, 2024Updated last year
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,684Apr 3, 2026Updated last month
- Advanced dork Search & Mass Exploit Scanner☆1,564Aug 10, 2024Updated last year
- Exploitation Framework for Embedded Devices☆13,105Updated this week
- UFONet - Denial of Service Toolkit☆2,459Aug 23, 2024Updated last year
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,968Aug 15, 2023Updated 2 years ago
- E-mails, subdomains and names Harvester - OSINT☆16,127May 2, 2026Updated last week
- Generate Gmail Emailing Keyloggers to Windows.☆1,147Dec 2, 2022Updated 3 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆2,841Sep 1, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,681Sep 26, 2023Updated 2 years ago
- Common User Passwords Profiler (CUPP)☆5,909Dec 26, 2025Updated 4 months ago
- Automatically brute force all services running on a target.☆2,255Aug 18, 2024Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,257Mar 9, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,646Updated this week
- Powerful framework for rogue access point attack.☆2,447Jan 9, 2024Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15,024Oct 6, 2025Updated 7 months ago