realgam3 / pymultitor
PyMultitor - Python Multi Threaded Tor Proxy
☆566Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for pymultitor
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆131Updated last year
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆262Updated 7 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆724Updated 7 years ago
- Exploits and Security Tools Framework 2.0.1☆304Updated 2 years ago
- GTRS - Google Translator Reverse Shell☆616Updated last month
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947Updated 5 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆390Updated 7 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆490Updated 5 years ago
- Script to steal passwords from ssh.☆477Updated 5 years ago
- Search Exploitable Software on Linux☆222Updated last year
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆404Updated 4 years ago
- Scans for accessibility tools backdoors via RDP☆328Updated 6 years ago
- A full-fledged msfrpc library for Metasploit framework.☆300Updated 3 years ago
- A framework for Backdoor development!☆436Updated 6 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,072Updated 4 years ago
- Automates some pentest jobs via nmap xml file☆322Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆520Updated 4 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆176Updated 5 years ago
- CMS Detection and Exploit Kit based on Whatcms.org API☆252Updated this week
- An exploit for Apache Struts CVE-2017-9805☆249Updated 7 years ago
- ☆596Updated last month
- transform your payload.exe into one fake word doc (.ppt)☆460Updated 4 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆540Updated last month
- A WebSocket C2 Tool☆387Updated 6 years ago
- Extract subdomains from SSL certificates in HTTPS sites.☆369Updated last week
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆537Updated 3 years ago
- Smart Install Exploitation Tool☆572Updated 2 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆486Updated 3 years ago
- A python reverse shell that uses DNS as the c2 channel☆500Updated 9 years ago