TorghostNG - Make all your internet traffic anonymized with Tor network. Rewritten from TorGhost with Python 3
☆56Apr 27, 2020Updated 5 years ago
Alternatives and similar repositories for TorghostNG
Users that are interested in TorghostNG are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Phone Number Gathering & OSINT Tool. Collects Phone Numbers and Performs OSINT on the Numbers. Only works on Nigerian Numbers at the mome…☆14Aug 25, 2020Updated 5 years ago
- This toll is For Kali Linux. This is powerful tool that can connect your whole pc with tor network. Forgot the Tor Browser. Now you can u…☆30Oct 3, 2025Updated 5 months ago
- FUD Android Payload and Listener☆20Jul 3, 2018Updated 7 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Analysis and Creation of Wordlists with Complex Passwords for Password Cracking☆10Feb 23, 2026Updated last month
- TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected v…☆910Mar 6, 2021Updated 5 years ago
- WPF Control Explorer is a simple tool that allows you to explore the various built-in controls used in creating WPF desktop applications.☆10Jul 10, 2020Updated 5 years ago
- ☆11Jul 3, 2021Updated 4 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆12Apr 7, 2017Updated 8 years ago
- Yescrypt Hash Cracker☆15Jan 13, 2026Updated 2 months ago
- TorghostNG - Reroute your internet traffic anonymized through Tor. Rewritten from TorGhost with Python 3☆26Jul 14, 2024Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- An interactive bash script for detecting IDOR vulnerabilities. Automates the discovery of access control issues in web applications, enha…☆15Apr 10, 2025Updated 11 months ago
- ☆12Apr 18, 2024Updated last year
- FB-PHISH is a phishing tool of FACEBOOK intented only that will work perfectly.☆10Dec 14, 2023Updated 2 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆21Jul 11, 2021Updated 4 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Maltego transforms for Hunchly☆17Jun 9, 2025Updated 9 months ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- A simple CLI tool for detecting breached emails and corresponding passwords.☆17Feb 4, 2024Updated 2 years ago
- ☆17Aug 23, 2023Updated 2 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- 一款可以批量验证邮箱有效性和批量枚举邮箱的工具,适用于寻找有效邮箱。☆17Jan 11, 2023Updated 3 years ago
- A bash script to compile Signal Desktop for the Raspberry Pi 4 on Ubuntu 21.04.☆14Nov 10, 2021Updated 4 years ago
- This script can pick up a password from user's databases to WiFi networks.☆18Jul 25, 2022Updated 3 years ago
- Spotify Connect/Radio player with OLED display☆14Jul 14, 2018Updated 7 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- A generic IOT framework, open for all user node-red devices and for any advanced custom logic, with some unique features: rich in interfa…☆25Oct 27, 2024Updated last year
- Custom rules by cyclone☆16Dec 12, 2025Updated 3 months ago
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆14Aug 29, 2023Updated 2 years ago
- Top hashpwn rules☆20Dec 12, 2025Updated 3 months ago
- A collection of tools to open up wifi networks. Please note that, depending on your local laws, use of these tools or some of their featu…☆16Oct 31, 2012Updated 13 years ago