Shellscript opens multiple TOR instances
☆107Dec 7, 2020Updated 5 years ago
Alternatives and similar repositories for Multi-TOR
Users that are interested in Multi-TOR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Jun 16, 2012Updated 13 years ago
- Create multiple TOR instances with a load-balancing.☆1,142Nov 19, 2024Updated last year
- A rotating socks proxy using Tor, Delegate and Haproxy☆27Nov 6, 2014Updated 11 years ago
- Detect HTTP packet and inject redirect packet☆14Mar 1, 2018Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Sep 8, 2015Updated 10 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Oct 16, 2023Updated 2 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- eppy☆21Jan 14, 2019Updated 7 years ago
- The Hacker's Choice☆16Mar 15, 2026Updated last week
- ☆14Sep 20, 2014Updated 11 years ago
- Make your swine run like it's Divine☆10Mar 14, 2025Updated last year
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- A collection of scripts to explore domains and pick up information.☆13Sep 17, 2018Updated 7 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- ZeroNet.exe for Windows☆21Sep 6, 2019Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆20Jul 27, 2021Updated 4 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago