ruped24 / tor_ip_switcher
tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.
☆228Updated last year
Alternatives and similar repositories for tor_ip_switcher
Users that are interested in tor_ip_switcher are comparing it to the libraries listed below
Sorting:
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆470Updated 5 months ago
- Samples Phishing tools made for Linux it contains 30 different type of Phishing Pages made with flask☆105Updated 3 years ago
- A tool that finds and scan sites for sql injection vulnerability☆154Updated 5 years ago
- Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor networ…☆86Updated last year
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Simple script masks the phishing link under the normal URL☆82Updated 4 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆181Updated last week
- Ghost Eye Informationgathering Footprinting Scanner and Recon Tool Release. Ghost Eye is an Information Gathering Tool I made in python 3…☆304Updated 2 years ago
- This tool is design to find admin panel of any website by using custom wordlist or default wordlist easily and allow you to find admin pa…☆161Updated 4 years ago
- rang3r | Multi Thread IP + Port Scanner☆113Updated last year
- NekoBot | Auto Exploiter With 500+ Exploit 2000+ Shell☆369Updated 4 years ago
- PhishX - The Complete Spear Phishing Tool☆109Updated 6 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆121Updated last year
- Automated rogue access point setup tool.☆196Updated 4 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆31Updated last week
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆132Updated 4 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆232Updated 8 months ago
- Tor is a python based module for using tor proxy/network services on windows, osx, linux with just one click.☆157Updated 7 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Find exploits in local and online database☆74Updated 7 months ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.☆255Updated 2 years ago
- Simple Backdoor Manager with Python (based on weevely)☆94Updated 2 months ago
- Full Valid Fake Data Generator☆99Updated 7 months ago
- Username enumeration & reconnaisance suite☆173Updated 2 years ago
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆108Updated 3 years ago
- wifisky Python script for pentesting wireless networks☆91Updated 5 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆122Updated 6 months ago
- Android Crypter/Decrypter App Generator☆47Updated 6 years ago
- Advance mitm attack using fake access point☆131Updated 2 years ago