NCnew / BadProxyLinks
BadProxy is the tool which show a man in middle attack over the internet over the proxy
β10Updated 7 years ago
Alternatives and similar repositories for BadProxy
Users that are interested in BadProxy are comparing it to the libraries listed below
Sorting:
- π‘ A security research tool with shodan integrationβ25Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the stβ¦β27Updated 11 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.β22Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.β28Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- log file scrubberβ16Updated 6 years ago
- Network Guardianβ12Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network vβ¦β39Updated 9 years ago
- Download and Inject code into Google Chrome extensionsβ13Updated 7 years ago
- Multi source CVE/exploit parser.β27Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.β67Updated 6 years ago
- Download files out of open AWS bucketsβ38Updated 6 years ago
- Simple security surveillance script for linux distributions.β59Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabledβ55Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.β23Updated 7 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.β20Updated 9 years ago
- Simple Bash script to retrieve basic system information.β30Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.β61Updated 10 years ago
- WPS scan and pwn toolβ67Updated 5 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.β17Updated 7 years ago
- Data exfiltration PoC scriptsβ24Updated 9 years ago
- Search google for shellshock vulnerable sitesβ27Updated 10 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.β25Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwordsβ51Updated 7 years ago
- A simple tool to dump users in popular forums and CMS :)β29Updated 7 years ago
- Advanced Netstat Using Python For Windowsβ46Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphsβ41Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testersβ17Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.β20Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.β25Updated 8 years ago