Costinteo / hook-https
A small PoC demonstrating TLS interception on both HTTP1 and HTTP2
☆10Updated last year
Alternatives and similar repositories for hook-https:
Users that are interested in hook-https are comparing it to the libraries listed below
- Check for the existence of an email on Google platforms☆12Updated 9 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆11Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 10 months ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Updated last year
- Script to chain search parameters for MalwareBazaar☆9Updated 10 months ago
- ☆24Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- A C# Tool to gather information about email breaches☆13Updated last year
- ☆26Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 7 months ago
- Powershell Scripts for Blue Team members☆12Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 6 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Updated 5 months ago
- aiohttp LFI (CVE-2024-23334)☆24Updated 9 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆31Updated 7 months ago
- Repo for all my exploits/PoCs☆30Updated 4 months ago
- LKM Linux rootkit☆20Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated 11 months ago
- Extension functionality for the NightHawk operator client☆26Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated 10 months ago
- ☆14Updated 7 months ago
- ☆12Updated 5 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆32Updated last month
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Updated last year