One-stop TLS traffic inspection and manipulation using dynamic instrumentation
☆244Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for hallucinate
Users that are interested in hallucinate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆190Nov 19, 2025Updated 4 months ago
- A collection of Frida scripts that I created for iOS and Android mobile application assessments☆11Jun 18, 2022Updated 3 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Jan 28, 2022Updated 4 years ago
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- A small script to get syscall info from its number (intented to be used with Frida)☆21Aug 11, 2021Updated 4 years ago
- ☆95Sep 18, 2021Updated 4 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A golang utility to spider through a website searching for additional links.☆343Nov 7, 2020Updated 5 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆218Apr 26, 2022Updated 3 years ago
- Work In progress to capture all sorts of data transaction on any Platform supported by Frida.☆11Feb 13, 2026Updated last month
- shell, python, Frida js scripts, and so on.☆19Jan 13, 2023Updated 3 years ago
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- LDAP Swiss Army Knife☆51Dec 5, 2023Updated 2 years ago
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- Convenience tool for hashcat☆121Aug 26, 2025Updated 6 months ago
- ☆12Dec 26, 2017Updated 8 years ago
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆139Nov 18, 2019Updated 6 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Link sources to sinks in C# applications.☆150Apr 10, 2023Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Nov 29, 2020Updated 5 years ago
- Fermion, an electron wrapper for Frida & Monaco.☆701Mar 20, 2025Updated last year
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- ☆105Jan 3, 2023Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆72Feb 13, 2021Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 5 years ago
- Piper Burp Suite Extender plugin☆130Jan 14, 2026Updated 2 months ago
- Hide your payload in DNS☆614May 3, 2023Updated 2 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆130Sep 18, 2023Updated 2 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆129May 25, 2021Updated 4 years ago
- Constrained Language Mode + AMSI bypass all in one☆156Jul 29, 2019Updated 6 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆621Oct 6, 2025Updated 5 months ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Salesforce object access auditor☆118Jan 30, 2023Updated 3 years ago