A fast, modern and intelligent proxy rotator perfect for crawling and scraping public data.
☆140Mar 16, 2018Updated 8 years ago
Alternatives and similar repositories for proxifier
Users that are interested in proxifier are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- Proxy server supporting http, ssh, socks4, socks5, shadowsocks on port☆40Feb 2, 2026Updated last month
- Hacking Artifactory with server side template injection☆51Mar 12, 2020Updated 6 years ago
- SSH Server☆12Nov 20, 2025Updated 4 months ago
- A kinda reckless dns resolver. Still under development.☆16Mar 23, 2020Updated 6 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated last year
- Proxy rotate using - https://www.proxy-list.download/☆17Mar 14, 2021Updated 5 years ago
- A python RCE exploit on QNAP-QTS☆15Sep 15, 2020Updated 5 years ago
- Parallel Sorting for Go☆16Jul 7, 2025Updated 8 months ago
- ☆11Jul 28, 2020Updated 5 years ago
- Word segmentation problem in Golang☆14Jun 30, 2019Updated 6 years ago
- Nmap NSE script for enumerate indices, plugins and cluster nodes on an elasticsearch target☆42Apr 17, 2021Updated 4 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Day by day Lots of Newbie Come into bug Bounty They ask Social Site about Bug Bounty Site, So That's why I open My Hunted All Site.☆32Sep 20, 2020Updated 5 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Golang goroutines synchronization primitive wihout extra dependencies☆15Nov 8, 2024Updated last year
- Swiftly search FDNS datasets from Rapid7 Open Data☆23Nov 20, 2022Updated 3 years ago
- DNS resolver pools written in Go☆51Mar 4, 2026Updated 2 weeks ago
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆14Jan 15, 2025Updated last year
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Nov 17, 2021Updated 4 years ago
- ☆299Jul 16, 2022Updated 3 years ago
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- A Go scraper that validates security.txt files and outputs them in the disclose.io JSON format.☆23May 18, 2025Updated 10 months ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Aug 22, 2019Updated 6 years ago
- qsinject (Query String Inject) is a tool that allows you to quickly substitute query string values with regex matches, one-at-a-time.☆30May 6, 2020Updated 5 years ago
- Generates target specific word lists for Fuzzing with fuff☆113Sep 2, 2020Updated 5 years ago
- Dump all available paths and/or endpoints on WADL file.☆98Nov 24, 2025Updated 3 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- Simple Recon is just a simple bash script to automate my recon process.☆27May 12, 2021Updated 4 years ago
- Fresh DNS servers☆85Feb 8, 2026Updated last month
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Identify containers at runtime and observe them. No container runtime required. Read only access to the kernel.☆17Jul 24, 2021Updated 4 years ago