TorghostNG - Reroute your internet traffic anonymized through Tor. Rewritten from TorGhost with Python 3
☆26Jul 14, 2024Updated last year
Alternatives and similar repositories for TorghostNG
Users that are interested in TorghostNG are comparing it to the libraries listed below
Sorting:
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- A web browser extension for accessing I2P network anonymously☆14Jun 3, 2024Updated last year
- CSC 541 Assignment 4 B-Trees Introduction The goals of this assignment are two-fold: To introduce you to searching data on disk using B…☆11May 10, 2015Updated 10 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- API tool for hashes.com escrow☆12Dec 13, 2025Updated 3 months ago
- Cracking PDF password protection via hashcat.☆15Dec 24, 2025Updated 2 months ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Paypal fake proof, made in python☆13Nov 20, 2022Updated 3 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- ☆13May 3, 2020Updated 5 years ago
- Simple rotating proxy server☆12Nov 8, 2022Updated 3 years ago
- The infamous half baked and insecurities Market Soltion ,Eckmar Script v2 run on laravel 5.4 ,a script that costs around 600 dollars☆10Aug 7, 2021Updated 4 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆17Dec 23, 2021Updated 4 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- A small python script that uses msfvenom to hide a tcp reverse shell to an android device inside an APK file☆14Jul 18, 2020Updated 5 years ago
- Telegram Group Manager is a Python script built with the Telethon library that helps you efficiently manage members across Telegram group…☆41Updated this week
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- ☆13Oct 27, 2024Updated last year
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆15Jul 29, 2021Updated 4 years ago
- ☆15May 21, 2022Updated 3 years ago
- ☆19Apr 10, 2021Updated 4 years ago
- 2009 Id Cloning☆16Jun 6, 2022Updated 3 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 6 months ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- Custom hashcat kernel for new Metamask Vaults☆20Dec 12, 2025Updated 3 months ago
- A multifunctional Android RAT (TELEGRAM BASED)☆19Aug 2, 2022Updated 3 years ago
- Hastopolis Server Docker image☆19May 5, 2023Updated 2 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Modification of help_crack.py from https://wpa-sec.stanev.org/☆22Oct 21, 2024Updated last year
- ☆18Apr 4, 2024Updated last year
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Updated this week
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Oct 2, 2023Updated 2 years ago
- Multi-threaded Instagram Brute Forcer (100 attemps at once)☆13Sep 10, 2020Updated 5 years ago