SySS-Research / hallucinateLinks
One-stop TLS traffic inspection and manipulation using dynamic instrumentation
β243Updated 2 years ago
Alternatives and similar repositories for hallucinate
Users that are interested in hallucinate are comparing it to the libraries listed below
Sorting:
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ210Updated 4 years ago
- Frida Boot π’- A binary instrumentation workshop, with Frida, for beginners!β318Updated last year
- Minimal code to connect to a CEF debugger.β207Updated 5 years ago
- PageBuster - dump all executable pages of packed processes.β203Updated 4 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't caβ¦β202Updated 2 years ago
- d(ockerp)wn - a docker pwn tool managerβ157Updated 4 years ago
- SNIcatβ126Updated 3 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many featuresβ200Updated 2 months ago
- A U-Boot hacking toolkit for security researchers and tinkerersβ270Updated 2 years ago
- The first Linux hooking framework to allow merging two binary files into one!β95Updated last month
- The TLS-Scanner Module from TLS-Attackerβ275Updated last week
- Checksec tool in Python, Rich output. Based on LIEFβ336Updated this week
- A simple embedded Linux backdoor.β199Updated 4 years ago
- Execute ELF files without dropping them on diskβ492Updated 11 months ago
- Qubes containerization on Windowsβ130Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.β378Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β132Updated 2 years ago
- collection of verified Linux kernel exploitsβ187Updated 4 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.β505Updated last week
- Burp with Friendsβ103Updated 2 years ago
- A malware analysis and classification tool.β190Updated 3 years ago
- Binary Protocol Differβ119Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocolsβ241Updated 4 years ago
- Slide decks from my conference presentationsβ364Updated last year
- ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binariesβ¦β189Updated last year
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulatiβ¦β292Updated 3 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.β304Updated 3 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.β258Updated 7 months ago
- ncurses-grep: interactively navigate grep-like resultsβ32Updated last year
- A repository of previous info-sec presentations I've presented.β161Updated 7 months ago