SySS-Research / hallucinateLinks
One-stop TLS traffic inspection and manipulation using dynamic instrumentation
☆244Updated 3 years ago
Alternatives and similar repositories for hallucinate
Users that are interested in hallucinate are comparing it to the libraries listed below
Sorting:
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆318Updated last year
- Minimal code to connect to a CEF debugger.☆208Updated 5 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- Execute ELF files without dropping them on disk☆495Updated last year
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 3 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆138Updated 2 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆308Updated 3 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆126Updated 5 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- PCAP visualization tool☆103Updated 2 years ago
- ☆182Updated 5 years ago
- ☆81Updated last year
- Burp with Friends☆103Updated 2 years ago
- The TLS-Scanner Module from TLS-Attacker☆278Updated last month
- A repository of previous info-sec presentations I've presented.☆161Updated 10 months ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 2 years ago
- Artifacts for the Black Hat talk.☆105Updated 5 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆210Updated 2 years ago
- A fast and secure multi protocol honeypot.☆323Updated 3 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆301Updated 7 months ago
- Machine-learn password mangling rules☆113Updated 2 years ago
- ☆246Updated 4 years ago
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.☆213Updated 3 years ago
- Basic Electron Exploitation☆209Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated 10 months ago