raffaele-forte / backbox-anonymousView external linksLinks
Transparently Routing Traffic Through Tor
☆64Oct 27, 2024Updated last year
Alternatives and similar repositories for backbox-anonymous
Users that are interested in backbox-anonymous are comparing it to the libraries listed below
Sorting:
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- ☆16May 9, 2016Updated 9 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- A Windows Dev PC BoxStarter repository☆13Dec 13, 2018Updated 7 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Instagram password bruteforcer☆16Jul 24, 2015Updated 10 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- Automate your Kali Linux Penetration Testing toolchain☆31May 24, 2015Updated 10 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago
- I agree with mass surveillance, but not government corruption. This is the result.☆11Jun 20, 2020Updated 5 years ago
- This repository contains stuff which would be helpful for jailbroken iOS development.☆14Sep 15, 2015Updated 10 years ago
- Script to add iptables rules (on a linux system) that force all traffic through tor☆38May 15, 2015Updated 10 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- A script to enumerate valid usernames based on the requests response times.☆22May 3, 2022Updated 3 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 9 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- NetHunter android application☆21Nov 4, 2017Updated 8 years ago
- GNUradio blocks and python class to deal with CSP packets (Cubesat Space Protocol)☆17May 13, 2017Updated 8 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Apr 3, 2022Updated 3 years ago
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 9 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Feb 11, 2018Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- BlackArch menu, theme, and config for Xfce.☆16Apr 20, 2021Updated 4 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Proxmark 3☆22Jun 8, 2019Updated 6 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Dec 25, 2018Updated 7 years ago
- BoxStarter box scripts☆21Jan 1, 2018Updated 8 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Feb 3, 2017Updated 9 years ago