Non-HTTP Protocol Extension (NoPE) Proxy and DNS for Burp Suite.
☆45Apr 3, 2022Updated 3 years ago
Alternatives and similar repositories for nope-proxy
Users that are interested in nope-proxy are comparing it to the libraries listed below
Sorting:
- A minimalistic logger for Windows Kernel Drivers.☆25Mar 8, 2024Updated 2 years ago
- A format agnostic script to export an ELF file with DWARF symbols from a Ghidra program☆26Jul 18, 2024Updated last year
- TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.☆1,656May 25, 2024Updated last year
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- Python bindings for calling radamsa mutators☆27Feb 21, 2026Updated 2 weeks ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Feb 9, 2024Updated 2 years ago
- Golang implementation of @CCob's C# ThreadlessInject☆31May 11, 2024Updated last year
- From C to binary shellcode converter.☆56Nov 11, 2025Updated 3 months ago
- Protect your web-application with Dynamic Style Loading and Real-Time Obfuscation. Easy to use!☆69Aug 22, 2024Updated last year
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- windows API to hide console window by golang☆35Dec 20, 2021Updated 4 years ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- ☆13Jan 17, 2025Updated last year
- Bot to anonymously send E2EE messages over Signal to a subscriber list.☆11Feb 10, 2026Updated 3 weeks ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Everything you need about Burp Extension Generation☆157Jan 6, 2023Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆128Feb 28, 2026Updated last week
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆12Jan 26, 2025Updated last year
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Bypasses App-Bound Encryption to extract cookies, passwords, browsing history, autofill data, and payment info from Chromium-based browse…☆16Feb 27, 2026Updated last week
- ☆15May 2, 2024Updated last year
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- ☆12Aug 25, 2023Updated 2 years ago
- Pure Rust implementations of static Diffie-Hellman (and static elliptic-curve DH) key-exchange☆13Jan 12, 2021Updated 5 years ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11May 30, 2024Updated last year
- Notifications using Shoutrrr in GitHub Actions☆16Dec 9, 2025Updated 2 months ago
- USB Rubber Ducky implemented on FeatherS2 boards (e.g. Lolin S2 Pico)☆12Nov 21, 2022Updated 3 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- ☆11Dec 17, 2018Updated 7 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year