Hunt and Analyze Tor Onion Sites
☆23Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Onion-Hunter
Users that are interested in Onion-Hunter are comparing it to the libraries listed below
Sorting:
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- Public Github Pages for Cisco☆14Oct 16, 2018Updated 7 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated last year
- ☆17Mar 21, 2019Updated 6 years ago
- A simple "ransomware" using powershell☆14May 31, 2021Updated 4 years ago
- Raven is a Web application penetration testing tool.☆17Jun 16, 2021Updated 4 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆30Feb 25, 2026Updated last week
- ☆24Nov 11, 2022Updated 3 years ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Windows Defender ShellCode Execution Bypass☆128Dec 2, 2019Updated 6 years ago
- POCs to test Vlang in cybersecurity aspects.☆37Dec 29, 2022Updated 3 years ago
- Smart overlay for Cobalt Strike PS function☆30Mar 9, 2019Updated 6 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- The HfG Documentation Generator☆15Apr 15, 2025Updated 10 months ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Headless web crawler for bugbounty and penetration-testing/redteaming☆39Mar 25, 2024Updated last year
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Disable Windows Defender All Version☆31Jan 5, 2021Updated 5 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- black Ip lists, dorks-collection☆16Updated this week
- Daniel Dib's answers to Kirk Byers Python for Network Engineers Course Exercises☆10Mar 16, 2017Updated 8 years ago
- My (newer) Emacs configuration☆14Sep 14, 2025Updated 5 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Feb 2, 2024Updated 2 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Cryptography in SageMath.☆10Dec 17, 2018Updated 7 years ago
- Silent / Unattended Windows 11 Upgrade Powershell Script☆15Sep 30, 2025Updated 5 months ago
- Apply a base system configuration, quickly!☆17Dec 7, 2025Updated 2 months ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago