sleeyax / Chainforger
Proxy scraper for proxychains
☆45Updated 4 years ago
Alternatives and similar repositories for Chainforger:
Users that are interested in Chainforger are comparing it to the libraries listed below
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆48Updated 4 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆47Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 6 years ago
- A simple proxy scraper coded in Python.☆10Updated 8 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Updated 4 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Random stuff☆16Updated 6 years ago
- Gmail Knocker☆21Updated 7 years ago
- python tools to assist in penetration testing☆14Updated 7 months ago
- Anontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and…☆30Updated 9 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)☆19Updated 4 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- ☆23Updated 5 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 2 months ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆25Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 7 months ago