RamadhanAmizudin / squid3-beEFLinks
Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.
☆13Updated 10 years ago
Alternatives and similar repositories for squid3-beEF
Users that are interested in squid3-beEF are comparing it to the libraries listed below
Sorting:
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆61Updated 8 years ago
- An automated SMB relay exploitation script.☆154Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆126Updated 2 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 9 years ago
- ☆12Updated 9 years ago
- A web interface for Hashcat/oclHashcat☆29Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆147Updated 10 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Various Cheat Sheets related to development and security☆144Updated 5 years ago
- Yet another AV evasion tool☆118Updated 3 years ago
- Web Sight Docker Deployment☆122Updated 8 years ago
- ☆10Updated 10 years ago
- Useful pentesting scripts☆84Updated 10 months ago
- ☆43Updated 9 years ago
- Unofficial Kali Documentation Project☆160Updated 10 years ago
- Metasploit AV Evasion Tool☆257Updated 10 years ago
- Reddit XSS Gather Tool☆20Updated 10 years ago
- ☆129Updated 10 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- ☆426Updated 8 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆192Updated 6 years ago
- Duct Tape Command and Control!☆96Updated 5 months ago
- ☆152Updated 2 years ago
- Automated digital reconnaissance☆203Updated 3 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago