Create multiple TOR instances with a load-balancing.
☆1,142Nov 19, 2024Updated last year
Alternatives and similar repositories for multitor
Users that are interested in multitor are comparing it to the libraries listed below
Sorting:
- An engine to make Tor network your default gateway☆2,312Mar 13, 2026Updated last week
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆508Nov 19, 2024Updated last year
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,821Nov 19, 2024Updated last year
- Open source tool to help you build a valid SSL certificate chain.☆377Nov 19, 2024Updated last year
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.☆281Nov 19, 2024Updated last year
- Network share sniffer and auto-mounter for crawling remote file systems☆213Mar 27, 2022Updated 3 years ago
- Inject malicious code into *.debs☆285Apr 26, 2022Updated 3 years ago
- A port of ParrotSec's stealth and anonsurf modules to Kali Linux☆1,831Feb 17, 2025Updated last year
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Oct 16, 2023Updated 2 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆156Nov 15, 2019Updated 6 years ago
- PyMultitor - Python Multi Threaded Tor Proxy☆576Aug 30, 2025Updated 6 months ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77May 28, 2018Updated 7 years ago
- Exploitation Framework for Embedded Devices☆13,028Mar 2, 2026Updated 2 weeks ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆530Oct 24, 2017Updated 8 years ago
- ☆25May 9, 2021Updated 4 years ago
- A script used to create a whonix like gateway/workstation environment with docker containers.☆127Oct 13, 2019Updated 6 years ago
- A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs provi…☆644Feb 9, 2022Updated 4 years ago
- Attack Surface Management Platform☆9,466Feb 15, 2026Updated last month
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,948Mar 22, 2024Updated 2 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆750Sep 1, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,237Nov 20, 2025Updated 4 months ago
- Striker is an offensive information and vulnerability scanner.☆2,322Jun 4, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,450Nov 3, 2018Updated 7 years ago
- My simple Swiss Army knife for http/https troubleshooting and profiling.☆3,853Nov 19, 2024Updated last year
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Tallow - Transparent Tor for Windows☆559Sep 11, 2021Updated 4 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,520Jun 10, 2025Updated 9 months ago
- A list of awesome Tor related projects, articles, papers, etc☆485Sep 3, 2023Updated 2 years ago
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,322Jan 23, 2018Updated 8 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,024Mar 13, 2023Updated 3 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Automated Mass Exploiter☆5,217May 22, 2023Updated 2 years ago
- Human and machine readable web vulnerability testing format☆195Sep 19, 2022Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Reconnaissance Swiss Army Knife☆2,022Jan 26, 2021Updated 5 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,528Mar 26, 2024Updated last year
- A poorman's proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies☆142Mar 3, 2023Updated 3 years ago
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago