A port of ParrotSec's stealth and anonsurf modules to Kali Linux
☆1,834Feb 17, 2025Updated last year
Alternatives and similar repositories for kali-anonsurf
Users that are interested in kali-anonsurf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- parrot anonymous mode☆429Dec 19, 2023Updated 2 years ago
- Transparent proxy through Tor for Kali Linux OS☆1,214Apr 18, 2024Updated last year
- Sets Transparent proxy tunnel through Tor, I2P, Privoxy, Polipo and modify DNS; Include Anonymizing Relay Monitor (arm), macchanger and w…☆319Sep 26, 2022Updated 3 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,108Mar 17, 2024Updated 2 years ago
- Automatically install all Kali linux tools☆5,218Apr 29, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 3 years ago
- All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆3,571Jul 31, 2024Updated last year
- Create multiple TOR instances with a load-balancing.☆1,143Nov 19, 2024Updated last year
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆910Mar 6, 2021Updated 5 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,586Mar 11, 2026Updated 2 weeks ago
- Attack Surface Management Platform☆9,622Feb 15, 2026Updated last month
- An engine to make Tor network your default gateway☆2,316Mar 22, 2026Updated last week
- Phishing Tool & Information Collector☆4,692Oct 29, 2024Updated last year
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The LAZY script will make your life easier, and of course faster.☆4,318Aug 28, 2021Updated 4 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,324Jan 23, 2018Updated 8 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,217Oct 9, 2023Updated 2 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,703Oct 21, 2024Updated last year
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆11,950Aug 8, 2024Updated last year
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,276Oct 13, 2025Updated 5 months ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆644Feb 9, 2022Updated 4 years ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆5,469Nov 1, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The Rogue Access Point Framework☆14,516Feb 4, 2025Updated last year
- Fluxion is a remake of linset by vk496 with enhanced functionality.☆5,635Mar 16, 2026Updated last week
- Advanced dork Search & Mass Exploit Scanner☆1,558Aug 10, 2024Updated last year
- Exploitation Framework for Embedded Devices☆13,045Mar 2, 2026Updated 3 weeks ago
- UFONet - Denial of Service Toolkit☆2,445Aug 23, 2024Updated last year
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,936Aug 15, 2023Updated 2 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,151Dec 2, 2022Updated 3 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆2,790Sep 1, 2023Updated 2 years ago
- Common User Passwords Profiler (CUPP)☆5,830Dec 26, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- E-mails, subdomains and names Harvester - OSINT☆15,912Updated this week
- Automatically brute force all services running on a target.☆2,234Aug 18, 2024Updated last year
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,626Sep 26, 2023Updated 2 years ago
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,252Mar 9, 2020Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,663Mar 23, 2026Updated last week
- Powerful framework for rogue access point attack.☆2,412Jan 9, 2024Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,756Oct 6, 2025Updated 5 months ago