SySS-Research / hallucinateLinks
One-stop TLS traffic inspection and manipulation using dynamic instrumentation
☆244Updated 3 years ago
Alternatives and similar repositories for hallucinate
Users that are interested in hallucinate are comparing it to the libraries listed below
Sorting:
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Minimal code to connect to a CEF debugger.☆209Updated 5 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆317Updated 2 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Qubes containerization on Windows☆130Updated 4 years ago
- Execute ELF files without dropping them on disk☆498Updated last year
- ☆246Updated 4 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆142Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- A repository of previous info-sec presentations I've presented.☆162Updated last year
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- The TLS-Scanner Module from TLS-Attacker☆279Updated last month
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 5 months ago
- Burp with Friends☆103Updated 2 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆217Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- SNIcat☆128Updated 4 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- macOS persistence tool☆226Updated 3 years ago
- collection of verified Linux kernel exploits☆190Updated 4 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆215Updated 3 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- Basic Electron Exploitation☆207Updated 6 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆309Updated 3 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆311Updated 9 months ago
- PCAP visualization tool☆104Updated 2 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆203Updated 3 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago