Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.
☆17Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for SocketProxy
Users that are interested in SocketProxy are comparing it to the libraries listed below
Sorting:
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Feb 1, 2024Updated 2 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- ☆13May 28, 2013Updated 12 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 11 years ago
- Keeps track of connections to a node http server and provides a way to close connections☆23Feb 20, 2016Updated 10 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19May 21, 2015Updated 10 years ago
- TLS SNI virtual hosts bruteforcer☆22Aug 26, 2014Updated 11 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Pcap importer for Burp☆110Jun 27, 2021Updated 4 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Consume a stream until a given pattern is found☆12Feb 24, 2017Updated 9 years ago
- Code for my blog post on combining S2E and Kaitai Struct☆15Jun 1, 2019Updated 6 years ago
- Transform XML feeds☆21Dec 7, 2022Updated 3 years ago
- An introductory tutorial for the Coq proof assistant.☆10Feb 5, 2019Updated 7 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Self-contained educational implementation of the BLISS-B Bimodal Lattice Signature Scheme☆17Feb 26, 2016Updated 10 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- mozilla: Firefox's X.509 certificate verification core code.☆21Oct 7, 2015Updated 10 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆17Feb 10, 2016Updated 10 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 10 years ago
- Ruby SPF Parser☆30Sep 12, 2024Updated last year
- A simple term frequency library (see https://en.wikipedia.org/wiki/Tf%E2%80%93idf#Term_frequency_2 )☆11Oct 18, 2016Updated 9 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago