All Projects → bane → Similar Projects or Alternatives

374 Open source projects that are alternatives of or similar to bane

TORhunter
Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .onion
Stars: ✭ 47 (-71.86%)
Mutual labels:  tor, hacking-tools
Hacker101
Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+7232.93%)
Mutual labels:  sql-injection, clickjacking
Brutegram
Instagram multi-bruteforce Platfrom
Stars: ✭ 183 (+9.58%)
peniot
PENIOT: Penetration Testing Tool for IoT
Stars: ✭ 164 (-1.8%)
Mutual labels:  hacking-tools, iot-hacking
Autosqli
An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.
Stars: ✭ 222 (+32.93%)
Mutual labels:  tor, sql-injection
solutions-bwapp
In progress rough solutions to bWAPP / bee-box
Stars: ✭ 158 (-5.39%)
Mutual labels:  sql-injection
overload
📡 Overload DoS Tool (Layer 7)
Stars: ✭ 167 (+0%)
Mutual labels:  ddos-attacks
DevBrute-A Password Brute Forcer
DevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (-45.51%)
Mutual labels:  bruteforce-attacks
onionize
create an onion site from a directory, file, zip or an HTTP(S) site
Stars: ✭ 30 (-82.04%)
Mutual labels:  tor
caddy-altonions
Opportunistic Onions plugin for Caddy
Stars: ✭ 20 (-88.02%)
Mutual labels:  tor
VPS-Bug-Bounty-Tools
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (-73.65%)
Mutual labels:  hacking-tools
sqlscan
Quick SQL Scanner, Dorker, Webshell injector PHP
Stars: ✭ 140 (-16.17%)
Mutual labels:  sql-injection
onionjuggler
Manage your Onion Services via CLI or TUI on Unix-like operating system with a POSIX compliant shell.
Stars: ✭ 31 (-81.44%)
Mutual labels:  tor
RedLogin
Red Login: SSH Brute-force Tools
Stars: ✭ 99 (-40.72%)
Mutual labels:  bruteforce-attacks
torpool
Containerized pool of multiple Tor instances with load balancing and HTTP proxy.
Stars: ✭ 42 (-74.85%)
Mutual labels:  tor
Tor-IP-Addresses
Hourly checked and updated list of IP Addresses of Tor and Tor Exit Nodes
Stars: ✭ 182 (+8.98%)
Mutual labels:  tor
alias-wallet
Official Alias source code repository
Stars: ✭ 5 (-97.01%)
Mutual labels:  tor
OnionHarvester
A small TOR Onion Address harvester for checking if the address is available or not.
Stars: ✭ 71 (-57.49%)
Mutual labels:  tor
GhostNET
GhostNET script that will help you be safer on the cyber
Stars: ✭ 45 (-73.05%)
Mutual labels:  tor
T0rlib4j
T0rlib4j is a Java controller library for Tor
Stars: ✭ 50 (-70.06%)
Mutual labels:  tor
OrionServer
An open-source, centralized HTTPS botnet
Stars: ✭ 58 (-65.27%)
Mutual labels:  tor
tor-router-nexx-wt3020
Make a cheap TOR router for $10
Stars: ✭ 15 (-91.02%)
Mutual labels:  tor
Black-Tool
Install the tools and start Attacking , black-tool v5.0 ! ⬛
Stars: ✭ 239 (+43.11%)
Mutual labels:  hacking-tools
onionfruit
OnionFruit™ Connect - Tor access client with country selection, bridge configuration, pluggable transports and experimental DNS support
Stars: ✭ 150 (-10.18%)
Mutual labels:  tor
ipChecker
Check if a IP is from tor or is a malicious proxy
Stars: ✭ 50 (-70.06%)
Mutual labels:  tor
privcy
Official Repository for PRiVCY Coin $PRiV
Stars: ✭ 26 (-84.43%)
Mutual labels:  tor
AMP-Research
Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks
Stars: ✭ 246 (+47.31%)
Mutual labels:  ddos-attacks
minipwner
A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (-68.26%)
Mutual labels:  hacking-tools
RWST
Red Widow Spider Tools
Stars: ✭ 26 (-84.43%)
Mutual labels:  hacking-tools
website-fingerprinting
Deanonymizing Tor or VPN users with website fingerprinting and machine learning.
Stars: ✭ 59 (-64.67%)
Mutual labels:  tor
NDecrypt
Cartridge encrypt/decrypt
Stars: ✭ 22 (-86.83%)
Mutual labels:  encryption-decryption
alpine-tor-docker
A minimal Docker image with the Tor daemon running in the background.
Stars: ✭ 23 (-86.23%)
Mutual labels:  tor
Password-Store
Saves your password with cryptography so only you can decode it.
Stars: ✭ 15 (-91.02%)
Mutual labels:  encryption-decryption
torjail
🔒 download, verify & run torbrowser in a sandbox
Stars: ✭ 14 (-91.62%)
Mutual labels:  tor
T-XPLOITER
T-XPLOITER is a Perl program for detect and (even) exploit website(s). Why the name is T-XPLOITER ? T means Triple, XPLOITER means Exploiter. This program has 3 features and functions to detect and (even) exploit website(s), just check it out :).
Stars: ✭ 13 (-92.22%)
Mutual labels:  remote-code-execution
ToRat client
This is the ToRat client, a part of the ToRat Project.
Stars: ✭ 29 (-82.63%)
Mutual labels:  tor
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+186.23%)
Mutual labels:  sql-injection
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+1058.08%)
Mutual labels:  hacking-tools
theonionbox
Dashboard to monitor Tor node operations
Stars: ✭ 116 (-30.54%)
Mutual labels:  tor
ip2proxy-python
Python library for IP2Proxy database lookup. It can be used to find the IP addresses which are used as VPN anonymizer, open proxies, web proxies and Tor exits.
Stars: ✭ 19 (-88.62%)
Mutual labels:  tor
hackable
A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
Stars: ✭ 61 (-63.47%)
Mutual labels:  sql-injection
Aoyama
A New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (-3.59%)
Mutual labels:  ddos-attacks
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+76.05%)
Mutual labels:  hacking-tools
urlbuster
Powerful mutable web directory fuzzer to bruteforce existing and/or hidden files or directories.
Stars: ✭ 144 (-13.77%)
Mutual labels:  bruteforce-attacks
PythonScrapyBasicSetup
Basic setup with random user agents and IP addresses for Python Scrapy Framework.
Stars: ✭ 57 (-65.87%)
Mutual labels:  tor
guessTor
Bruteforces [.onion] domains
Stars: ✭ 78 (-53.29%)
Mutual labels:  tor
hackarsenaltoolkit
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Stars: ✭ 39 (-76.65%)
Mutual labels:  hacking-tools
request-on-steroids
An HTTP client ✨ with retry, circuit-breaker and tor support 📦 out-of-the-box
Stars: ✭ 19 (-88.62%)
Mutual labels:  tor
hasherbasher
SQL injection via bruteforced MD5 hash reflection of random strings
Stars: ✭ 40 (-76.05%)
Mutual labels:  sql-injection
private-tor-network-kube
Scripts to set up a private tor network on kubernetes
Stars: ✭ 14 (-91.62%)
Mutual labels:  tor
pyhtools
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (-0.6%)
Mutual labels:  hacking-tools
caucus
Realtime Collaborate Editor with Embedded Compiler
Stars: ✭ 278 (+66.47%)
Mutual labels:  remote-code-execution
rce-agent
gRPC-based Remote Command Execution Agent
Stars: ✭ 111 (-33.53%)
Mutual labels:  remote-code-execution
Docker-Swarm-DDOS
How to create a Denial of Service Attack through Docker Swarm.
Stars: ✭ 36 (-78.44%)
Mutual labels:  ddos-attacks
onion-pi
Configures your Raspberry Pi as portable WiFi-WiFi Tor proxy.
Stars: ✭ 13 (-92.22%)
Mutual labels:  tor
ip2proxy-java
IP2Proxy Java Component.It can be used to find the IP addresses which are used as VPN anonymizer, open proxies, web proxies and Tor exits.
Stars: ✭ 16 (-90.42%)
Mutual labels:  tor
ehtk
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (-64.67%)
Mutual labels:  hacking-tools
LogMePwn
A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
Stars: ✭ 362 (+116.77%)
Mutual labels:  rce-scanner
cryptopocket
🔐 Encrypt anything, then Decrypt by providing a required key.
Stars: ✭ 22 (-86.83%)
Mutual labels:  encryption-decryption
STIA
No description or website provided.
Stars: ✭ 18 (-89.22%)
Mutual labels:  hacking-tools
1-60 of 374 similar projects