TorNet is a Python package that automates IP address changes using Tor. It is a top tool for securing your networks by frequently changing your IP address, making it difficult for trackers to pinpoint your location.
☆251Sep 27, 2025Updated 5 months ago
Alternatives and similar repositories for tornet
Users that are interested in tornet are comparing it to the libraries listed below
Sorting:
- AURA is a decentralized messenger leveraging Nearby Connections technology to create robust offline mesh networks.☆39Feb 6, 2026Updated last month
- easypy makes python even easier!☆17Jul 21, 2025Updated 7 months ago
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆20Apr 24, 2025Updated 10 months ago
- Clementine music player integration for Discord☆14Feb 21, 2024Updated 2 years ago
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆44Aug 1, 2025Updated 7 months ago
- ☆15Nov 25, 2021Updated 4 years ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Feb 3, 2025Updated last year
- command control framework☆31Updated this week
- Install parrot os gui mode in termux☆22May 1, 2024Updated last year
- Exploitation framework for IP cameras☆21Jun 9, 2019Updated 6 years ago
- Red Team Scaner☆56Nov 25, 2025Updated 3 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 8 months ago
- for tutorial only☆13May 11, 2025Updated 9 months ago
- TorNet is a Python-powered anonymity tool that automatically rotates IP addresses using the Tor network, enhancing privacy and making onl…☆68Dec 24, 2025Updated 2 months ago
- A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type dete…☆66Feb 23, 2026Updated 2 weeks ago
- This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information ga…☆545Jan 18, 2026Updated last month
- Born in HackUPC 2024, GNSS Tracker is an Android application that allows to retrieve and analyze data from the different GNSS satellite c…☆33Sep 21, 2025Updated 5 months ago
- Analyze Android native `.so` files☆118Jul 28, 2025Updated 7 months ago
- Osint-fb is a tool for searching for information gathering on Facebook with various available methods.☆46Oct 16, 2025Updated 4 months ago
- WEBFANG, is my first CLI, a modular OSINT & Reconnaissance toolkit curated for Ethical Hackers and Red-Teamers. Sink fangs into web targe…☆83Updated this week
- ☆34Jan 26, 2024Updated 2 years ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- A JavaScript-based DDoS attack☆11Jul 17, 2025Updated 7 months ago
- ☆12Mar 8, 2025Updated last year
- ☆20Aug 6, 2025Updated 7 months ago
- HieraChain - The Hierarchical Blockchain Enterprise Ledger☆26Updated this week
- Jupyter Notebook Praktikum Projects. This is repository with data analyst educational projects from Yandex.Praktikum.☆12Feb 21, 2021Updated 5 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- ☆14Updated this week
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- ☆37Sep 30, 2021Updated 4 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 8 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- ☆36Jan 26, 2026Updated last month
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 7 months ago
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆268Dec 23, 2024Updated last year