Redirect All Traffic Through Tor Network For Kali Linux
☆222Mar 26, 2025Updated last year
Alternatives and similar repositories for AnonGT
Users that are interested in AnonGT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Dec 21, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- ☆24Nov 18, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 👀Sagemode: Track and Unveil Online identities across social media platforms🕵️♂️☆276Dec 21, 2023Updated 2 years ago
- Dark-Shell is a Tool for Generating ReverShell File☆115Oct 30, 2025Updated 4 months ago
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated last year
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆153May 17, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆116Aug 3, 2024Updated last year
- Discord bot for the Shodan API - OSINT tool☆87Mar 8, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- A web service to clean documents from potentially privacy-invasive metadata☆50Apr 29, 2025Updated 11 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91May 18, 2025Updated 10 months ago
- Nmap & SQL injection automation tool☆40Oct 14, 2024Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Dec 5, 2023Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆48Jul 18, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆190Jul 30, 2024Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆135Aug 20, 2025Updated 7 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- Discovering Typo Squatting on your domains!☆81Jul 30, 2024Updated last year
- Custom Kali Linux☆22Feb 8, 2014Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An OSINT Framework project based on Python☆110Jun 5, 2024Updated last year
- URLs very strong obfuscation tool (can be used in requests too)☆17Oct 3, 2024Updated last year
- ☆318Mar 26, 2024Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Bypass 403 pages☆130Jun 30, 2024Updated last year
- ☆19Mar 4, 2023Updated 3 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago