emadshanab / Tor-IP-ChangerView external linksLinks
☆13Aug 10, 2022Updated 3 years ago
Alternatives and similar repositories for Tor-IP-Changer
Users that are interested in Tor-IP-Changer are comparing it to the libraries listed below
Sorting:
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 2 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆26May 22, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- ☆11Aug 31, 2023Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Jul 1, 2024Updated last year
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- ☆19Sep 24, 2024Updated last year
- Archive for acez.re blog.☆19Apr 17, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- AstroCrypt is a powerful and versatile tool designed to assist you in both cracking hashed passwords and identifying the hash type used t…☆17Oct 26, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Apr 1, 2025Updated 10 months ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 9 months ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- ☆23May 27, 2024Updated last year
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Nov 5, 2025Updated 3 months ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 5 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- WooCommerce Payments: Unauthorized Admin Access Exploit☆42May 31, 2023Updated 2 years ago
- 📚A curated list of product security resources.☆22Jun 11, 2025Updated 8 months ago
- A list of transforms for searching Red, Yellow, and UNSC notices by Name or Phrase.☆25Jun 15, 2023Updated 2 years ago
- سناب شات سكرابر تتيح لك تحميل القصص العامة من سناب شات مع الصور والفيديوهات، وتعرض التواريخ الزمنية لكل قصة. تركز على الخصوصية ولا تصل لل…☆14Apr 1, 2025Updated 10 months ago
- XML-RPC Vulnerability Checker and Directory Fuzzer☆22Sep 28, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Burp Suite extension that enhances Burp Active Scan by adding template engine specific SSTI payloads.☆24Feb 20, 2024Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Dec 13, 2025Updated 2 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Oct 28, 2023Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- PoC repository for CVE-2023-29007☆36Apr 26, 2023Updated 2 years ago
- ☆39Mar 28, 2025Updated 10 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Jul 18, 2023Updated 2 years ago