htrgouvea / nipeView external linksLinks
An engine to make Tor network your default gateway
☆2,284Jan 23, 2026Updated 3 weeks ago
Alternatives and similar repositories for nipe
Users that are interested in nipe are comparing it to the libraries listed below
Sorting:
- Create multiple TOR instances with a load-balancing.☆1,142Nov 19, 2024Updated last year
- Transparent proxy through Tor for Kali Linux OS☆1,199Apr 18, 2024Updated last year
- Attack Surface Management Platform☆9,378Jan 12, 2026Updated last month
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,997Mar 17, 2024Updated last year
- Find exploits in local and online databases instantly☆1,807Sep 27, 2021Updated 4 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,624Updated this week
- Dark Web OSINT Tool☆3,763Jan 8, 2026Updated last month
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,508Feb 5, 2026Updated last week
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,262Oct 13, 2025Updated 4 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Mar 22, 2024Updated last year
- A collection of awesome penetration testing resources, tools and other shiny things☆25,238Jan 25, 2026Updated 2 weeks ago
- Efficient and advanced man in the middle framework☆2,162Mar 23, 2023Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,578Jun 20, 2024Updated last year
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,811Feb 17, 2025Updated 11 months ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆644Feb 9, 2022Updated 4 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,547Aug 10, 2024Updated last year
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆911Mar 6, 2021Updated 4 years ago
- A swiss army knife for pentesting networks☆9,050Dec 6, 2023Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,222Aug 26, 2024Updated last year
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,447May 6, 2024Updated last year
- Know the dangers of credential reuse attacks.☆2,087Dec 9, 2025Updated 2 months ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆525Oct 24, 2017Updated 8 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,507Mar 26, 2024Updated last year
- Exploitation Framework for Embedded Devices☆12,964Jun 10, 2025Updated 8 months ago
- Automated Mass Exploiter☆5,208May 22, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,005Jan 26, 2021Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Nov 3, 2018Updated 7 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,633Dec 15, 2024Updated last year
- A Modern Orchestration Engine for Security☆6,096Updated this week
- The Offensive Manual Web Application Penetration Testing Framework.☆1,850Apr 19, 2023Updated 2 years ago
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- AntiVirus Evasion Tool☆1,739Apr 23, 2025Updated 9 months ago
- File upload vulnerability scanner and exploitation tool.☆3,300May 8, 2025Updated 9 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,617Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,600Oct 6, 2025Updated 4 months ago
- MSFvenom Payload Creator (MSFPC)☆1,310May 9, 2021Updated 4 years ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,566Apr 21, 2025Updated 9 months ago
- Phishing Tool & Information Collector☆4,658Oct 29, 2024Updated last year