An engine to make Tor network your default gateway
☆2,316Mar 22, 2026Updated last week
Alternatives and similar repositories for nipe
Users that are interested in nipe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Framework for rapid development of offensive security tools☆112Mar 22, 2026Updated last week
- [W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data☆32Updated this week
- Create multiple TOR instances with a load-balancing.☆1,143Nov 19, 2024Updated last year
- My past public researches are archived here☆20Updated this week
- Transparent proxy through Tor for Kali Linux OS☆1,214Apr 18, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Proof of concept denial of service over TOR stress test tool☆42Feb 23, 2026Updated last month
- HTTP fuzzer engine security oriented☆60Mar 22, 2026Updated last week
- Attack Surface Management Platform☆9,622Feb 15, 2026Updated last month
- Find exploits in local and online databases instantly☆1,812Sep 27, 2021Updated 4 years ago
- Automated All-in-One OS Command Injection Exploitation Tool☆5,687Mar 22, 2026Updated last week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,108Mar 17, 2024Updated 2 years ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,276Oct 13, 2025Updated 5 months ago
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆910Mar 6, 2021Updated 5 years ago
- Dark Web OSINT Tool☆3,923Jan 8, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,834Feb 17, 2025Updated last year
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,586Mar 11, 2026Updated 2 weeks ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,954Mar 22, 2024Updated 2 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,637Jan 25, 2026Updated 2 months ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆644Feb 9, 2022Updated 4 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,631Jun 20, 2024Updated last year
- Efficient and advanced man in the middle framework☆2,178Mar 23, 2023Updated 3 years ago
- Exploitation Framework for Embedded Devices☆13,045Mar 2, 2026Updated 3 weeks ago
- Advanced dork Search & Mass Exploit Scanner☆1,558Aug 10, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,532Mar 26, 2024Updated 2 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Oct 30, 2018Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,246Aug 26, 2024Updated last year
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,451May 6, 2024Updated last year
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,155Mar 13, 2026Updated 2 weeks ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,457Nov 3, 2018Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,756Oct 6, 2025Updated 5 months ago
- Automated Mass Exploiter☆5,223May 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 3 months ago
- File upload vulnerability scanner and exploitation tool.☆3,306May 8, 2025Updated 10 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,147Dec 15, 2024Updated last year
- The Offensive Manual Web Application Penetration Testing Framework.☆1,848Apr 19, 2023Updated 2 years ago
- The LAZY script will make your life easier, and of course faster.☆4,318Aug 28, 2021Updated 4 years ago
- Repositorio dedicado á comunidade de Programadores Perl do Brasil, aqui você encontrará links para materias e muito mais.☆45Mar 23, 2020Updated 6 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,912Updated this week