omersayak / SocksHarvester
SocksHarvester quickly tests SOCKS4/5 proxies and lists the valid ones. Ideal for network professionals with its multi-threading support.
☆26Updated 11 months ago
Alternatives and similar repositories for SocksHarvester:
Users that are interested in SocksHarvester are comparing it to the libraries listed below
- ProxyHarvester is a bash script designed to scrape, deduplicate, and test SOCKS5 proxies from a variety of sources. Whether you're a deve…☆13Updated 11 months ago
- LNK-Dropper Builder☆18Updated 4 months ago
- Python RAT that uses Telegram as C2 endpoint☆25Updated last year
- T-Converter Free v1.0☆21Updated 5 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆11Updated 8 months ago
- PassBreaker☆55Updated 9 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆25Updated 4 months ago
- Wifi Adapter TxPower Tuner is a Python tool for Linux that adjusts wireless Tx-Power. It offers a user-friendly interface to set Tx-Power…☆10Updated 11 months ago
- i will upload all the books that helped me in learning in this repo☆20Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆47Updated 7 months ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆13Updated 7 months ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 8 months ago
- 🥊 ddos clustering☆45Updated last year
- ☆23Updated last year
- 🔮 Python Remote administration tool via telegram☆46Updated 10 months ago
- GENERATE PYTHON BASED FUD STUB☆19Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆19Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Auto exploitation tool for CVE-2024-24401.☆30Updated 4 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆58Updated 9 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- This script allows you to manage VPN configurations with ease. It fetches VPN configurations from VPNBook and connects to your selected V…☆13Updated 5 months ago
- This repository contains the best fuzzing wordlist files☆29Updated last month
- NetFuzzer is a comprehensive network security assessment tool for internal and external networks, including Firewalls, Routers, Switches,…☆13Updated this week
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆43Updated 6 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆51Updated 10 months ago
- Social Engineering Browser Update Attack.☆56Updated last year