omersayak / SocksHarvesterLinks
SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.
☆28Updated last year
Alternatives and similar repositories for SocksHarvester
Users that are interested in SocksHarvester are comparing it to the libraries listed below
Sorting:
- Clipboard poisoning attack.☆57Updated 5 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆39Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆25Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated 2 years ago
- This is a tool to obfuscate / to make your python code unreadable. It obfuscates your code and prevents easy access of others to your cod…☆42Updated last year
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆40Updated 2 years ago
- UAdmin Phishlets for common sites☆15Updated 6 months ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆56Updated 2 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆49Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆52Updated last year
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆15Updated 4 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- An ADB-based botnet written in C.☆45Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Tool to parse Stealer Logs.☆20Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated last year
- A simple port scanner using python☆16Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- Improved SMTP Checker / SMTP Cracker with proxy-support, inbox test and many more features.☆202Updated 2 years ago
- xSMTP 🦟 Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.☆78Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆27Updated 2 years ago
- AXIS Botnet☆17Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- PHP lab to test captcha bypassing☆30Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆25Updated 2 years ago
- PrivacyNet: Privacy Network☆53Updated last year