An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the ACE protocol used in Siri Dictation communications.
☆22Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for mitmproxy-ace
Users that are interested in mitmproxy-ace are comparing it to the libraries listed below
Sorting:
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆47Aug 20, 2025Updated 7 months ago
- Learning how to use IOSurfaceAccelerator☆24Apr 9, 2023Updated 2 years ago
- A program to keep the frequency of gqrx and Hamlib (i.e. a transceiver) synchronised☆11Feb 16, 2017Updated 9 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- ☆15May 28, 2022Updated 3 years ago
- Host your own *OS Entitlement Database☆56Oct 23, 2025Updated 4 months ago
- ☆30Jan 7, 2021Updated 5 years ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- Mach Fuzzing Tools☆32Oct 24, 2013Updated 12 years ago
- Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack s…☆25Jun 24, 2020Updated 5 years ago
- A library & CLI tool that automatically sets up GitHub WebHooks and listens for events, with automatic TLS☆21Jan 22, 2026Updated last month
- ☆31Jun 18, 2020Updated 5 years ago
- Tailscale fixes☆12Sep 17, 2024Updated last year
- IDAPython script for quick vulnerability analysis☆32May 10, 2014Updated 11 years ago
- Legacy OS X GLX Implementation (has since been merged into mesa)☆14Oct 17, 2015Updated 10 years ago
- ☆25Aug 21, 2023Updated 2 years ago
- Virtual camera using v4l2-loopback driver☆16Nov 4, 2022Updated 3 years ago
- IDA loader for Apple SecureROM☆13Sep 29, 2019Updated 6 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 4 months ago
- SALSA 💃⚡ - SALesforce Scanner for Aura (and beyond). Enumeration of vulnerabilities and misconfigurations against Salesforce endpoint.☆29Jan 26, 2025Updated last year
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- Mirror my talk materials☆47Oct 16, 2025Updated 5 months ago
- ☆18Nov 7, 2024Updated last year
- ☆11Apr 10, 2018Updated 7 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Starlink gRPC for Golang☆14Mar 13, 2026Updated last week
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- ☆13Jul 31, 2020Updated 5 years ago
- Here I store my proof of concepts☆14Sep 6, 2024Updated last year
- ☆14Dec 26, 2022Updated 3 years ago
- Convert JSON IAM Policies to other formats☆26Mar 14, 2026Updated last week
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- Show or Replace the serialnumber on your Prusa Einsy board clone☆12Jan 3, 2021Updated 5 years ago
- A Model Context Protocol (MCP) server for OpenSCAD 3D modeling and rendering☆49Feb 15, 2026Updated last month
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- An XPC Wrapper for OS X☆15May 29, 2019Updated 6 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year