Shellscript opens multiple TOR instances
☆106Dec 7, 2020Updated 5 years ago
Alternatives and similar repositories for Multi-TOR
Users that are interested in Multi-TOR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Create multiple TOR instances with a load-balancing.☆1,151Nov 19, 2024Updated last year
- Simple TOR Socks Proxy Container☆13Jun 8, 2016Updated 9 years ago
- A rotating socks proxy using Tor, Delegate and Haproxy☆27Nov 6, 2014Updated 11 years ago
- Detect HTTP packet and inject redirect packet☆14Mar 1, 2018Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Oct 16, 2023Updated 2 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Bash script that deploys virtual proxies which route traffic through OpenVPN and Tor tunnels.☆10Jul 29, 2019Updated 6 years ago
- eppy☆21Jan 14, 2019Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- A collection of category-specific host files☆14Oct 18, 2025Updated 5 months ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- Resurrecting and updating the best log cleaner☆36Jan 2, 2015Updated 11 years ago
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- An universal HTTP bot creator☆21Oct 26, 2016Updated 9 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago