Take back your privacy. Lose yourself in the haystack.
☆559Feb 28, 2025Updated last year
Alternatives and similar repositories for Needl
Users that are interested in Needl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script to apply a Transparent proxy through Tor with nftables or iptables and can optionally forge a random MAC, localtime, ip, hostname.…☆126Apr 6, 2020Updated 5 years ago
- An OSINT tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.☆347Feb 28, 2025Updated last year
- Convert any binary data to a PNG image file and vice versa.☆135Dec 25, 2023Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- ISP Data Pollution to Protect Private Browsing History with Obfuscation☆608Mar 20, 2023Updated 3 years ago
- Script for searching for a word or symbol on the sites specified in the text file☆34Nov 14, 2025Updated 4 months ago
- Fancy I2P address generator☆34May 24, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Scramb.py is a region based JPEG Image Scrambler and Descrambler written in Python for End-to-End-Encrypted (E2EE) Image distribution thr…☆59Jun 18, 2022Updated 3 years ago
- Simple random DNS, HTTP/S internet traffic noise generator☆1,770Nov 25, 2023Updated 2 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Linux shared object injector written in pure C☆51May 19, 2025Updated 10 months ago
- Yet another python sms library☆94Nov 22, 2022Updated 3 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,802Feb 28, 2025Updated last year
- Encode in a character set of your choice☆68May 3, 2024Updated last year
- Keystroke-level online anonymization kernel: obfuscates typing behavior at the device level.☆516Apr 23, 2025Updated 11 months ago
- Performing the following operations using python on PDF.☆253Dec 23, 2021Updated 4 years ago
- The way of moving through different projects☆14Feb 22, 2026Updated last month
- Fast dominant colors extraction CLI☆112Oct 17, 2024Updated last year
- ☆27Mar 26, 2025Updated 11 months ago
- 🧸 fully isolated honeypot ssh server using thrussh☆279Nov 19, 2024Updated last year
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Simple Airtable-backend link shortener☆58Jul 3, 2024Updated last year
- Turn on/off your remote machine without leaving your couch!☆89Aug 13, 2021Updated 4 years ago
- Java I2P router in Docker☆15Jan 30, 2021Updated 5 years ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- QR code with encrypted content☆56Dec 27, 2022Updated 3 years ago
- An ultra-simple, dependency free PHP app for sharing sensitive text (basically like onetimesecret), but with full end-to-end AES-256-GCM …☆53Updated this week
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Proof of Work protected TCP server.☆29Nov 8, 2023Updated 2 years ago
- This async script is designed to get proxies from several sites and save it to a file.☆26Sep 30, 2021Updated 4 years ago
- 📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)☆256Sep 21, 2018Updated 7 years ago
- Simple tool to visualize and amplify mouse movements☆75May 12, 2021Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- A console utility to bring up new Tor nodes easily☆24May 7, 2022Updated 3 years ago
- Brute forcer and shell deployer for WildFly☆99Mar 10, 2018Updated 8 years ago
- HDDSuperClone, HDDSuperTool☆416Mar 8, 2025Updated last year
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago