Category: TOR


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

KaliKali LinuxKalitorifyNEW TOOLSTORTor NetworkTor ProjectTorifyWhonix

Kalitorify – Transparent Proxy Through Tor For Kali Linux OS

kalitorify is a shell script for Kali Linux which use iptables settings for transparent proxy through Tor, the program also allows you to perform various checks like checking the external ip, or if Tor has been configured correctly.What is Transparent Proxy?Also known as an intercepting proxy, inline proxy, or forced proxy, a transparent proxy intercepts normal communication at the network layer without requiring any special client configuration. Clients need not be aware of the existence of the proxy. A transparent proxy is normally located…

ACHECrawlerCrawlingDiscoverDomain Specific SearchElasticsearchFocused CrawlerHidden ServicesNEW TOOLSTORWeb CrawlerWeb ScrapingWeb SearchWeb Spider

ACHE – A Web Crawler For Domain-Specific Search

ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to a given domain or that contain a user-specified pattern. ACHE differs from generic crawlers in sense that it uses page classifiers to distinguish between relevant and irrelevant pages in a given domain. A page classifier can be from a simple regular expression (that matches every page that contains a specific word, for example), to a machine-learning based classification model. ACHE can also automatically learn…

Arbitrary File UploadJQShellMacNEW TOOLSpwnedTOR

JQShell – A Weaponized Version Of CVE-2018-9206 (Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0)

JQShellA weaponized version of CVE-2018-9206 (Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0).DisclaimerUsing this agianst servers you dont control, is illegal in most countries. The author claims no responsibility for the actions of those who use this software for illegal purposes. This software is intended for educational use only. No servers were illegally pwned in the making of this software.FeaturesSingle Target Multi Target Tor PrerequisitesPlease install these required packages.Python3pip3 install requests pysocks subprocess stem Tor Control PortTo use tor, in this script,…

AnonimityDocker TOR Hidden ServiceHiddenHidden ServicesNEW TOOLSTORTor Network

Docker TOR Hidden Service – Easily Setup A Hidden Service Inside The Tor Network

Easily run a hidden service inside the Tor network with this containerGenerate the skeleton configuration for you hidden service, replace for your hidden service pattern name. Example, if you want to your hidden service contain the word 'boss', just use this word as argument. You can use regular expressions, like ^boss, will generate an address wich will start with 'boss'. Be aware that bigger the pattern, more time it will take to generate it.docker run -it --rm -v $(pwd)/web:/web \ strm/tor-hiddenservice-nginx generate <pattern>Create an…

4NonimizerAnonymizingBashBash ScriptKaliKali LinuxNEW TOOLSPrivoxyTORTor Network

4Nonimizer – A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers

It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at…

Anonymity OnlineAnonymizingMacNEW TOOLSTORTor BrowserTor Browser Bundle

Tor Browser 8.0 – Everything you Need to Safely Browse the Internet

Tor Browser 8.0, is the first stable release based on Firefox 60 ESR, is now available from the Tor Browser Project page and also from distribution directory. This release is all about users first.Tor Browser 8.0 comes with a series of user experience improvements that address a set of long-term Tor Browser issues you’ve told us about. To meet our users' needs, Tor Browser has a new user onboarding experience; an updated landing page that follows our styleguide; additional language support; and new behaviors for…

Admin FinderAdmin Panel FinderCangibrinaMacNEW TOOLSNmapScanTORWordlist

Cangibrina v0.8.7 – A Fast And Powerfull Dashboard (Admin) Finder

Dashboard FinderCangibrina is a multi platform tool which aims to obtain the Dashboard of sites using brute-force over wordlist, google, nmap, and robots.txtRequirements:Python 2.7mechanizePySocksbeautifulsoup4html5libNmap (--nmap)TOR (--tor)Install:Linux git clone cd cangibrina pip install -r requirements.txtUsageusage: [-h] -u U [-w W] [-t T] [-v] [--ext EXT] [--user-agent] [--tor] [--search] [--dork DORK] [--nmap [NMAP]]Fast and powerful admin finderoptional arguments: -h, --help show this help message and exit -u U target site -w W set wordlist (default: wl_medium) -t T set threads number (default: 5) -v…

ClamavCrawlingMacMalShareNEW TOOLSPh0NeutriaSandboxTORViperVirusTotal

Ph0Neutria – A Malware Zoo Builder That Sources Samples Straight From The Wild

ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manageability.This project was inspired by Ragpicker (, formerly known as "Malware Crawler"). However, ph0neutria aims to:Limit the scope of crawling to only frequently updated and reliable sources.Maximise the effectiveness of individual indicators.Offer a single, reliable and well organised storage mechanism.Not do work that can instead be done by Viper.What does the name mean? "Phoneutria nigriventer" is commonly known as the Brazillian…

AnonymityAnonymizeNEW TOOLSNipePerlTORTor Network

Nipe – A Script To Make TOR Network Your Default Gateway

Tor enables users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both Licit and Illicit purposes. Tor has, for example, been used by criminals enterprises, Hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously.Nipe is a Script to make Tor Network your Default Gateway.This Perl Script enables you to directly route all your traffic from your computer to the Tor Network through which you can surf the Internet Anonymously without…