Simple Python script for fetching "some" (usable) proxies
☆580Mar 15, 2023Updated 2 years ago
Alternatives and similar repositories for fetch-some-proxies
Users that are interested in fetch-some-proxies are comparing it to the libraries listed below
Sorting:
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- powerful auto-backdooring utility☆750Dec 20, 2017Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- PyMultitor - Python Multi Threaded Tor Proxy☆575Aug 30, 2025Updated 6 months ago
- ☆613Oct 4, 2024Updated last year
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- Damn Small SQLi Scanner☆868Jan 1, 2025Updated last year
- Damn Small Vulnerable Web☆857Dec 21, 2025Updated 2 months ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- Malicious traffic detection system☆8,264Updated this week
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,043Nov 24, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆263Sep 12, 2016Updated 9 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆822Dec 6, 2017Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Finds public elite anonymity proxies and concurrently tests them☆251Nov 23, 2016Updated 9 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 2 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆345Aug 14, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,227Nov 20, 2025Updated 3 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Collection of social engineering payloads☆300Oct 19, 2017Updated 8 years ago
- offsec batteries included☆1,601Mar 11, 2024Updated last year
- Auxiliary stuff☆37Feb 27, 2026Updated last week
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago