vektort13 / AntiTelemetryLeak
Forward all telemetry data through Proxy
☆11Updated 5 years ago
Related projects: ⓘ
- Simple script that protects you from the Font Fingerprint technique☆36Updated 5 years ago
- Level 2A - A hint for Antidetect(VirtualBox) to defeat Real Time Stamp Counters detection (ex Pafish)☆24Updated 6 years ago
- Level 2B - OS unique identifiers spoof☆83Updated 5 years ago
- Source code of Firefox-based Antidetect browser. Project is not maintained, aside of critical vulnerabilities in devtools, and requires a…☆91Updated 4 years ago
- Antidetect source code. Protection from detection.☆25Updated 5 years ago
- OpenVPN road warrior installer for Debian, Ubuntu and CentOS☆12Updated 5 years ago
- UAC Bypass for windows☆37Updated 4 years ago
- Domain Seeker☆12Updated 11 months ago
- Network Security Config patcher for Android applications (APKs)☆13Updated 3 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆63Updated 6 years ago
- A cloud based remote android managment suite(Botnet), powered by NodeJS☆12Updated 3 years ago
- A Web API For Checking Combos by IMAP☆12Updated 4 years ago
- ☆13Updated this week
- ☆12Updated 3 years ago
- Light C++ Logger Library☆18Updated 6 years ago
- Zero font obfuscation for your html letters. Multiple alphabets☆9Updated 3 years ago
- ☆10Updated this week
- Simple way to disable/rename buttons from a task manager☆31Updated 4 years ago
- 🚀Steal Tdata from PC (FTP)☆16Updated 4 years ago
- Скрытие процессов и файлов в user mode☆19Updated 4 years ago
- 👾 WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)☆23Updated 5 years ago
- ☆16Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- ☆37Updated this week
- ☆13Updated this week
- HTTP botnet☆61Updated 8 years ago
- ☆13Updated this week
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 3 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆10Updated 5 years ago
- ☆85Updated this week