omersayak / SocksHarvester
SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.
☆24Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for SocksHarvester
- T-Converter Free v1.0☆18Updated 3 months ago
- LNK-Dropper Builder☆16Updated last month
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated last year
- i will upload all the books that helped me in learning in this repo☆20Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 5 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆19Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆12Updated 3 months ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆21Updated last year
- Hacking with PasteJacking technique☆19Updated 4 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆107Updated 3 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆20Updated last year
- Whspdefendor Exploit Framework v1.0☆13Updated 11 months ago
- Python RAT that uses Telegram as C2 endpoint☆25Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆20Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆34Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆38Updated 2 years ago
- Social Engineering Browser Update Attack.☆54Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated 2 years ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆13Updated 4 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆38Updated last month
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- Clipboard poisoning attack.☆54Updated 4 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆52Updated 3 years ago
- A Simple Script For SSH BruteForce☆35Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆36Updated 10 months ago