An engine to make Tor network your default gateway
☆2,299Mar 1, 2026Updated last week
Alternatives and similar repositories for nipe
Users that are interested in nipe are comparing it to the libraries listed below
Sorting:
- Create multiple TOR instances with a load-balancing.☆1,143Nov 19, 2024Updated last year
- Transparent proxy through Tor for Kali Linux OS☆1,206Apr 18, 2024Updated last year
- Attack Surface Management Platform☆9,435Feb 15, 2026Updated 3 weeks ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,075Mar 17, 2024Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool☆5,645Feb 28, 2026Updated last week
- Dark Web OSINT Tool☆3,808Jan 8, 2026Updated 2 months ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,545Updated this week
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,269Oct 13, 2025Updated 4 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,943Mar 22, 2024Updated last year
- Proof of concept denial of service over TOR stress test tool☆42Feb 23, 2026Updated 2 weeks ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,470Jan 25, 2026Updated last month
- Efficient and advanced man in the middle framework☆2,177Mar 23, 2023Updated 2 years ago
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,824Feb 17, 2025Updated last year
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,604Jun 20, 2024Updated last year
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆645Feb 9, 2022Updated 4 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,553Aug 10, 2024Updated last year
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆910Mar 6, 2021Updated 5 years ago
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,235Aug 26, 2024Updated last year
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,447May 6, 2024Updated last year
- Know the dangers of credential reuse attacks.☆2,098Dec 9, 2025Updated 3 months ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,519Mar 26, 2024Updated last year
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆530Oct 24, 2017Updated 8 years ago
- Exploitation Framework for Embedded Devices☆13,014Mar 2, 2026Updated last week
- Automated Mass Exploiter☆5,215May 22, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,017Jan 26, 2021Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,449Nov 3, 2018Updated 7 years ago
- A Modern Orchestration Engine for Security☆6,116Mar 1, 2026Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,832Dec 15, 2024Updated last year
- The Offensive Manual Web Application Penetration Testing Framework.☆1,848Apr 19, 2023Updated 2 years ago
- File upload vulnerability scanner and exploitation tool.☆3,302May 8, 2025Updated 10 months ago
- Striker is an offensive information and vulnerability scanner.☆2,318Jun 4, 2023Updated 2 years ago
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,321Sep 1, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,667Oct 6, 2025Updated 5 months ago
- E-mails, subdomains and names Harvester - OSINT☆15,772Updated this week
- MSFvenom Payload Creator (MSFPC)☆1,313May 9, 2021Updated 4 years ago
- Th3Inspector 🕵️ Best Tool For Information Gathering 🔎☆2,576Apr 21, 2025Updated 10 months ago