Up-to-date list of running Tor nodes
☆30Mar 25, 2026Updated this week
Alternatives and similar repositories for tor-nodes
Users that are interested in tor-nodes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Jul 4, 2025Updated 8 months ago
- Lightweight security tool for auditing your organization's Conditional Access Policies (CAPs) in Microsoft Entra ID for potential misconf…☆79Feb 25, 2025Updated last year
- PHP lightweight in-app Web Application Firewall☆21Aug 6, 2024Updated last year
- Library for reading KeePass files and decrypt the passwords within it☆14Jun 25, 2024Updated last year
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- PNG renderer for Prometheus☆28Jan 8, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- ☆10May 6, 2023Updated 2 years ago
- GUI for regripper☆11Mar 19, 2019Updated 7 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated 2 months ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆11Jun 12, 2023Updated 2 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- A blazing fast, highly customizable, modern-day defence tool using (in memory) SQL & REST/gRPC protocols.☆20Mar 13, 2024Updated 2 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- Development repository for the snort cookbook☆27Mar 2, 2026Updated 3 weeks ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- The pattern matching swiss knife☆16Oct 28, 2019Updated 6 years ago
- ☆17Mar 21, 2026Updated last week
- This is a CLI tool to check a csv of email addresses and user names in https://haveibeenpwned.com☆13Jul 13, 2018Updated 7 years ago
- Monitor your targets and hunt fresh assets in real time.☆162Feb 23, 2026Updated last month
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆16Mar 20, 2024Updated 2 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Sigma to Wazuh rule converter☆18Sep 28, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Dec 21, 2023Updated 2 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 4 months ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 8 months ago
- ☆14Nov 16, 2022Updated 3 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago