An engine to make Tor network your default gateway
☆2,318Apr 14, 2026Updated this week
Alternatives and similar repositories for nipe
Users that are interested in nipe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Framework for rapid development of offensive security tools☆112Updated this week
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆33Apr 7, 2026Updated last week
- Create multiple TOR instances with a load-balancing.☆1,150Nov 19, 2024Updated last year
- Some of my past public researches are archived here☆20Updated this week
- Transparent proxy through Tor for Kali Linux OS☆1,216Apr 18, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept denial of service over TOR stress test tool☆42Feb 23, 2026Updated last month
- HTTP fuzzer engine security oriented☆60Apr 7, 2026Updated last week
- Attack Surface Management Platform☆9,673Feb 15, 2026Updated 2 months ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,704Updated this week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,133Mar 17, 2024Updated 2 years ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,272Oct 13, 2025Updated 6 months ago
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆911Mar 6, 2021Updated 5 years ago
- Dark Web OSINT Tool☆3,964Jan 8, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,851Feb 17, 2025Updated last year
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,642Apr 9, 2026Updated last week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,963Mar 22, 2024Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,834Jan 25, 2026Updated 2 months ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆644Feb 9, 2022Updated 4 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,644Jun 20, 2024Updated last year
- Efficient and advanced man in the middle framework☆2,179Mar 23, 2023Updated 3 years ago
- Exploitation Framework for Embedded Devices☆13,072Mar 2, 2026Updated last month
- Advanced dork Search & Mass Exploit Scanner☆1,560Aug 10, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Oct 30, 2018Updated 7 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,529Mar 26, 2024Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,260Aug 26, 2024Updated last year
- A swiss army knife for pentesting networks☆9,124Dec 6, 2023Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,453May 6, 2024Updated last year
- A Modern Orchestration Engine for Security☆6,193Apr 6, 2026Updated last week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,458Nov 3, 2018Updated 7 years ago
- Automated Mass Exploiter☆5,228May 22, 2023Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,862Oct 6, 2025Updated 6 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 4 months ago
- File upload vulnerability scanner and exploitation tool.☆3,313May 8, 2025Updated 11 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,424Updated this week
- The Offensive Manual Web Application Penetration Testing Framework.☆1,853Apr 19, 2023Updated 3 years ago
- Repositorio dedicado á comunidade de Programadores Perl do Brasil, aqui você encontrará links para materias e muito mais.☆45Mar 23, 2020Updated 6 years ago
- The LAZY script will make your life easier, and of course faster.☆4,319Aug 28, 2021Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,999Apr 10, 2026Updated last week