TORhunterDesigned to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (-71.86%)
Hacker101Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+7232.93%)
BrutegramInstagram multi-bruteforce Platfrom
Stars: ✭ 183 (+9.58%)
peniotPENIOT: Penetration Testing Tool for IoT
Stars: ✭ 164 (-1.8%)
AutosqliAn automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (+32.93%)
solutions-bwappIn progress rough solutions to bWAPP / bee-box
Stars: ✭ 158 (-5.39%)
overload📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (+0%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-45.51%)
onionizecreate an onion site from a directory, file, zip or an HTTP(S) site
Stars: ✭ 30 (-82.04%)
VPS-Bug-Bounty-ToolsScript that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (-73.65%)
sqlscanQuick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (-16.17%)
onionjugglerManage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.
Stars: ✭ 31 (-81.44%)
RedLoginRed Login: SSH Brute-force Tools
Stars: ✭ 99 (-40.72%)
torpoolContainerized pool of multiple Tor instances with load balancing and HTTP proxy.
Stars: ✭ 42 (-74.85%)
Tor-IP-AddressesHourly checked and updated list of IP Addresses of Tor and Tor Exit Nodes
Stars: ✭ 182 (+8.98%)
alias-walletOfficial Alias source code repository
Stars: ✭ 5 (-97.01%)
OnionHarvesterA small TOR Onion Address harvester for checking if the address is available or not.
Stars: ✭ 71 (-57.49%)
GhostNETGhostNET script that will help you be safer on the cyber
Stars: ✭ 45 (-73.05%)
T0rlib4jT0rlib4j is a Java controller library for Tor
Stars: ✭ 50 (-70.06%)
OrionServerAn open-source, centralized HTTPS botnet
Stars: ✭ 58 (-65.27%)
Black-ToolInstall the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (+43.11%)
onionfruitOnionFruit™ Connect - Tor access client with country selection, bridge configuration, pluggable transports and experimental DNS support
Stars: ✭ 150 (-10.18%)
ipCheckerCheck if a IP is from tor or is a malicious proxy
Stars: ✭ 50 (-70.06%)
privcyOfficial Repository for PRiVCY Coin $PRiV
Stars: ✭ 26 (-84.43%)
AMP-ResearchResearch on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks
Stars: ✭ 246 (+47.31%)
minipwnerA script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (-68.26%)
RWSTRed Widow Spider Tools
Stars: ✭ 26 (-84.43%)
website-fingerprintingDeanonymizing Tor or VPN users with website fingerprinting and machine learning.
Stars: ✭ 59 (-64.67%)
NDecryptCartridge encrypt/decrypt
Stars: ✭ 22 (-86.83%)
alpine-tor-dockerA minimal Docker image with the Tor daemon running in the background.
Stars: ✭ 23 (-86.23%)
Password-StoreSaves your password with cryptography so only you can decode it.
Stars: ✭ 15 (-91.02%)
torjail🔒 download, verify & run torbrowser in a sandbox
Stars: ✭ 14 (-91.62%)
T-XPLOITERT-XPLOITER is a Perl program for detect and (even) exploit website(s). Why the name is T-XPLOITER ? T means Triple, XPLOITER means Exploiter. This program has 3 features and functions to detect and (even) exploit website(s), just check it out :).
Stars: ✭ 13 (-92.22%)
ToRat clientThis is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-82.63%)
magicReconMagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+186.23%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+1058.08%)
theonionboxDashboard to monitor Tor node operations
Stars: ✭ 116 (-30.54%)
ip2proxy-pythonPython library for IP2Proxy database lookup. It can be used to find the IP addresses which are used as VPN anonymizer, open proxies, web proxies and Tor exits.
Stars: ✭ 19 (-88.62%)
hackableA python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
Stars: ✭ 61 (-63.47%)
AoyamaA New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (-3.59%)
vafVaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+76.05%)
urlbusterPowerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (-13.77%)
PythonScrapyBasicSetupBasic setup with random user agents and IP addresses for Python Scrapy Framework.
Stars: ✭ 57 (-65.87%)
guessTorBruteforces [.onion] domains
Stars: ✭ 78 (-53.29%)
hackarsenaltoolkitHacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (-76.65%)
request-on-steroidsAn HTTP client ✨ with retry, circuit-breaker and tor support 📦 out-of-the-box
Stars: ✭ 19 (-88.62%)
hasherbasherSQL injection via bruteforced MD5 hash reflection of random strings
Stars: ✭ 40 (-76.05%)
pyhtoolsA Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (-0.6%)
caucusRealtime Collaborate Editor with Embedded Compiler
Stars: ✭ 278 (+66.47%)
rce-agentgRPC-based Remote Command Execution Agent
Stars: ✭ 111 (-33.53%)
Docker-Swarm-DDOSHow to create a Denial of Service Attack through Docker Swarm.
Stars: ✭ 36 (-78.44%)
onion-piConfigures your Raspberry Pi as portable WiFi-WiFi Tor proxy.
Stars: ✭ 13 (-92.22%)
ip2proxy-javaIP2Proxy Java Component.It can be used to find the IP addresses which are used as VPN anonymizer, open proxies, web proxies and Tor exits.
Stars: ✭ 16 (-90.42%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (-64.67%)
LogMePwnA fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
Stars: ✭ 362 (+116.77%)
cryptopocket🔐 Encrypt anything, then Decrypt by providing a required key.
Stars: ✭ 22 (-86.83%)
STIANo description or website provided.
Stars: ✭ 18 (-89.22%)