stamparm / fetch-some-proxiesView external linksLinks
Simple Python script for fetching "some" (usable) proxies
☆579Mar 15, 2023Updated 2 years ago
Alternatives and similar repositories for fetch-some-proxies
Users that are interested in fetch-some-proxies are comparing it to the libraries listed below
Sorting:
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆353Aug 27, 2018Updated 7 years ago
- Network traffic sensor☆114Jun 8, 2022Updated 3 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- powerful auto-backdooring utility☆748Dec 20, 2017Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago
- PyMultitor - Python Multi Threaded Tor Proxy☆575Aug 30, 2025Updated 5 months ago
- ☆612Oct 4, 2024Updated last year
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- Damn Small SQLi Scanner☆866Jan 1, 2025Updated last year
- Damn Small Vulnerable Web☆855Dec 21, 2025Updated last month
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- Malicious traffic detection system☆8,236Updated this week
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build on☆952Jan 12, 2023Updated 3 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Dec 13, 2017Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆262Sep 12, 2016Updated 9 years ago
- Various PoCs☆502Jan 27, 2020Updated 6 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆820Dec 6, 2017Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- Finds public elite anonymity proxies and concurrently tests them☆251Nov 23, 2016Updated 9 years ago
- Malicious HTTP traffic explorer☆725Mar 16, 2023Updated 2 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,218Nov 20, 2025Updated 2 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- Auxiliary stuff☆36Feb 7, 2026Updated last week
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Collection of social engineering payloads☆299Oct 19, 2017Updated 8 years ago
- offsec batteries included☆1,593Mar 11, 2024Updated last year
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago