Zopolis4 / TorghostNGLinks
TorghostNG - Reroute your internet traffic anonymized through Tor. Rewritten from TorGhost with Python 3
☆21Updated 11 months ago
Alternatives and similar repositories for TorghostNG
Users that are interested in TorghostNG are comparing it to the libraries listed below
Sorting:
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆31Updated last month
- W Generator - A powerful frontend tool for penetration testers to generate customized wordlists based on public user information☆40Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆53Updated last year
- ☆65Updated 2 years ago
- PassBreaker☆63Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Find Email Spoofing Vulnerablity of domains☆95Updated 10 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆79Updated last year
- A Powerfull Windows Ransomware with a Fully Undetectable Persistent Backdoor | System Halt Attack etc☆24Updated 3 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆123Updated 9 months ago
- Gmail/GSuite account enumeration tool☆51Updated last year
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆45Updated 8 months ago
- xdebug 2.5.5 RCE exploit☆31Updated 5 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 9 months ago
- PrivacyNet: Privacy Network☆48Updated 9 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆59Updated 3 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆19Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆25Updated 2 weeks ago
- Python3 script to dump breach data from Dehashed☆32Updated last month
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆22Updated last year
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆29Updated 2 years ago