A tool for automatically change the Tor IP address over time.
☆136Apr 6, 2025Updated 10 months ago
Alternatives and similar repositories for Tor-IP-Changer
Users that are interested in Tor-IP-Changer are comparing it to the libraries listed below
Sorting:
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with mu…☆79May 24, 2025Updated 9 months ago
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- ☆14Nov 8, 2024Updated last year
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- This DuckyScript, created by ooovenenoso, automates the removal of problematic CrowdStrike files causing BSOD on Windows. The script open…☆11Jul 23, 2024Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12☆13Aug 12, 2024Updated last year
- Leakix Searcher☆14Apr 30, 2021Updated 4 years ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆14Oct 18, 2024Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- A curated list of resources, tools, and wordlists for bug bounty hunters.☆17Updated this week
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 7 months ago
- Automatically change tor ip address over time when accessing the internet. Make it private and safe for you☆150Dec 4, 2024Updated last year
- collectvars collects JavaScript variables, highlights risky ones, and helps you understand code structure, while you casually browse.☆33Aug 28, 2024Updated last year
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated 11 months ago
- ☆13Oct 24, 2024Updated last year
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆36Oct 23, 2025Updated 4 months ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.☆31Jun 29, 2024Updated last year
- POC for CVE-2024-36401. This POC will attempt to establish a reverse shell from the vlun targets.☆35Jul 4, 2024Updated last year
- ☆15Dec 27, 2022Updated 3 years ago
- ☆13Mar 15, 2022Updated 3 years ago
- Analyze Android native `.so` files☆118Jul 28, 2025Updated 7 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- Application for logging HTTP and DNS Requests☆15May 14, 2021Updated 4 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆14Aug 22, 2024Updated last year
- SIFA-based attacks on AES☆38Dec 14, 2024Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- A malicous Golang Package☆15Apr 21, 2025Updated 10 months ago