Transparently Routing Traffic Through Tor
☆65Oct 27, 2024Updated last year
Alternatives and similar repositories for backbox-anonymous
Users that are interested in backbox-anonymous are comparing it to the libraries listed below
Sorting:
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- AppArmor profile for The Tor Browser Bundle (TBB) - https://www.whonix.org/wiki/AppArmor - for better security (hardening).☆21Sep 19, 2025Updated 6 months ago
- The `anonymous` script from ParrotSec OS and BackBox Linux, perfected to run on Kali Linux Rolling. Run the script with `sudo sh script.…☆135May 25, 2020Updated 5 years ago
- Script to add iptables rules (on a linux system) that force all traffic through tor☆38May 15, 2015Updated 10 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆19Nov 29, 2025Updated 3 months ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Emulate the Apple IR Remote with an Arduino☆25Mar 7, 2014Updated 12 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated 2 months ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- I agree with mass surveillance, but not government corruption. This is the result.☆11Jun 20, 2020Updated 5 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- BlackArch menu, theme, and config for Xfce.☆16Apr 20, 2021Updated 4 years ago
- Extra modules for the Mercury Android Security Assessment Framework.☆24Jul 10, 2013Updated 12 years ago
- Arduino sketches and Perl script to program flash on Nordic nRF24LE1 wireless SOC☆18Feb 24, 2015Updated 11 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago
- SDR GUI supporting various input hardware; mirror of https://gitea.osmocom.org/sdr/sdrangelove☆12Mar 13, 2018Updated 8 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆45Sep 27, 2015Updated 10 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Sep 27, 2018Updated 7 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- Automate your Kali Linux Penetration Testing toolchain☆31May 24, 2015Updated 10 years ago
- ☆13Jun 26, 2021Updated 4 years ago
- An unofficial Gentoo repository for installing Canonical's Snappy backbone☆29Jul 12, 2018Updated 7 years ago
- ☆15Feb 27, 2017Updated 9 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 9 years ago
- FLUXION☆10Jun 24, 2016Updated 9 years ago
- Automatically post images from a subreddit to an instagram account.☆10Feb 24, 2022Updated 4 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago