An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the ACE protocol used in Siri Dictation communications.
☆22Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for mitmproxy-ace
Users that are interested in mitmproxy-ace are comparing it to the libraries listed below
Sorting:
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆47Aug 20, 2025Updated 6 months ago
- ☆15May 28, 2022Updated 3 years ago
- Learning how to use IOSurfaceAccelerator☆24Apr 9, 2023Updated 2 years ago
- Host your own *OS Entitlement Database☆54Oct 23, 2025Updated 4 months ago
- Mach Fuzzing Tools☆32Oct 24, 2013Updated 12 years ago
- ☆30Jan 7, 2021Updated 5 years ago
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- ☆18Nov 7, 2024Updated last year
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- A collection of Apple-related CTF writeups☆15Jan 17, 2022Updated 4 years ago
- ☆11May 7, 2019Updated 6 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- Prototype compiler from AWS CloudFormation IaC templates into Logic.☆13Dec 5, 2023Updated 2 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- ☆11Apr 10, 2018Updated 7 years ago
- Mirror my talk materials☆47Oct 16, 2025Updated 4 months ago
- library to load and parse Mach-O core files without dependencies☆17Oct 4, 2021Updated 4 years ago
- Statement on Codegate Qualifiers 2023☆11Jun 19, 2023Updated 2 years ago
- This experimetal fuzzer is meant to be used for API in-memory fuzzing on Android.☆17Nov 26, 2019Updated 6 years ago
- A program to keep the frequency of gqrx and Hamlib (i.e. a transceiver) synchronised☆11Feb 16, 2017Updated 9 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- On-demand and reusable contact forms that only send GnuPG-encrypted messages to your inbox.☆13Jul 4, 2018Updated 7 years ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆14May 14, 2024Updated last year
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- Tailscale fixes☆12Sep 17, 2024Updated last year
- Starlink gRPC for Golang☆14Feb 22, 2026Updated last week
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- BUILDING AN APPLE OSX KERNEL MODULE WITH CMAKE – C/C++☆13Dec 27, 2017Updated 8 years ago