tasooshi / torboostLinks
Download utility for Tor
☆49Updated last year
Alternatives and similar repositories for torboost
Users that are interested in torboost are comparing it to the libraries listed below
Sorting:
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 9 months ago
- masscan with exclusive excludes☆56Updated last year
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 10 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 5 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Updated 2 years ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆41Updated 4 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆21Updated 2 months ago
- Rebuild of portspoof in GO with additional features.☆18Updated this week
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆37Updated 4 months ago
- ☆22Updated 4 years ago
- ☆54Updated 5 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆42Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆32Updated last year
- Capture screenshots of onion services on an onion service.☆49Updated 11 months ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆29Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- Make an Linux Kernel rootkit visible again.☆52Updated 3 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 4 months ago
- Tor onion address lookup☆40Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆23Updated 3 weeks ago
- ☆37Updated last year
- A user enumeration tool for Slack.☆28Updated 11 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year