Man in the Middle SOCKS Proxy for JAVA
☆37Feb 14, 2013Updated 13 years ago
Alternatives and similar repositories for mitmsocks4j
Users that are interested in mitmsocks4j are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An IDA plugin for GC DSP reverse engineering☆33Jul 14, 2021Updated 4 years ago
- ☆29Jul 26, 2016Updated 9 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- NaCl wrapper; uses `sodium` for the server-side and `tweetnacl-js` for the client☆22Oct 27, 2023Updated 2 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- ☆15Jan 19, 2018Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13May 11, 2015Updated 10 years ago
- The new client for Ironbane, the 3D WebGL MMO.☆29Dec 23, 2014Updated 11 years ago
- Massively Multiplayer Online Asteroids☆19Nov 3, 2015Updated 10 years ago
- ☆31Aug 26, 2015Updated 10 years ago
- Static DLL Patching and Hooking System☆25Sep 30, 2015Updated 10 years ago
- Pokemon Multiplayer Red☆30Aug 5, 2020Updated 5 years ago
- A Simple Http to Raw Socket Adapter for Android☆12Aug 30, 2015Updated 10 years ago
- Eclipse plugin to remote adb to an android device.☆24May 10, 2013Updated 12 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Addons for EloBuddy☆18Oct 31, 2016Updated 9 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Sample code for ICS security blog posts☆19Dec 2, 2012Updated 13 years ago
- HServer是一个功能强大,资源丰富,开发灵活,轻量级,低入侵,高并发的新型Web开发框架.☆21Dec 28, 2025Updated 2 months ago
- Demo project using JPA, Lucene, Spring, DBUnit and JMockit - to persist and search for simple Book data.☆17Oct 8, 2015Updated 10 years ago
- ☆26May 22, 2015Updated 10 years ago
- ☆21Dec 18, 2013Updated 12 years ago
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- Zipper data structure for Java☆14Sep 10, 2009Updated 16 years ago
- Mac和iPhone通过WiFi通信☆12Nov 17, 2016Updated 9 years ago
- ☆11May 8, 2019Updated 6 years ago
- Web based Gitolite Manager, written with node.js over express.js☆19Jul 23, 2011Updated 14 years ago
- ios逆向工程学习记录☆19Aug 7, 2017Updated 8 years ago
- 代码编辑框控件,自AndroidLua+的编辑框修改而来☆13Dec 13, 2018Updated 7 years ago
- LG Root Exploit☆36Jun 26, 2013Updated 12 years ago
- An inbuilt champion ability timer for League of Legends - works on allies and enemies.☆28Mar 14, 2017Updated 9 years ago
- Hive Storage Handler for SOLR☆16Mar 17, 2014Updated 12 years ago
- Example of how to catch USSD responses in Android☆10Dec 3, 2014Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- small utility to dump kernel memory☆26Jul 23, 2014Updated 11 years ago
- Provides a simpler approach to declaring and using AIDL objects for IPC on Android.☆13Aug 8, 2013Updated 12 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago