omersayak / SocksHarvester
SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.
☆26Updated last year
Alternatives and similar repositories for SocksHarvester:
Users that are interested in SocksHarvester are comparing it to the libraries listed below
- ProxyHarvester is a bash script designed to scrape, deduplicate, and test SOCKS5 proxies from a variety of sources. Whether you're a deve…☆13Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- LNK-Dropper Builder☆20Updated 5 months ago
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆13Updated 8 months ago
- Nmap & SQL injection automation tool☆31Updated 5 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆14Updated last month
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆12Updated 9 months ago
- 🔮 Python Remote administration tool via telegram☆47Updated 11 months ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆23Updated 7 months ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆29Updated 2 weeks ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated 11 months ago
- Mass bruteforce authentication of common services with common credentials.☆46Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- 🥊 ddos clustering☆45Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆95Updated 4 months ago
- Wifi Adapter TxPower Tuner is a Python tool for Linux that adjusts wireless Tx-Power. It offers a user-friendly interface to set Tx-Power…☆10Updated last year
- ☆9Updated 3 months ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆56Updated 6 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- ☆14Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- ☆13Updated last year
- Auto exploitation tool for CVE-2024-24401.☆32Updated 6 months ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated last year
- Hacking with PasteJacking technique☆21Updated 8 months ago