jeromesegura / VPNrotator
The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware traffic from different geolocations.
☆61Updated last month
Alternatives and similar repositories for VPNrotator:
Users that are interested in VPNrotator are comparing it to the libraries listed below
- This is a python version of samesame repo to generate homograph strings☆23Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- ☆22Updated 4 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆29Updated 4 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 weeks ago
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Updated 4 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆57Updated 6 months ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges☆45Updated 2 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- wordlists for password cracking☆27Updated 2 years ago
- ☆33Updated 2 months ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Updated 6 months ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- ☆17Updated 3 years ago
- Port Crawler Pythonized☆19Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago