SySS-Research / hallucinate
One-stop TLS traffic inspection and manipulation using dynamic instrumentation
β242Updated 2 years ago
Alternatives and similar repositories for hallucinate:
Users that are interested in hallucinate are comparing it to the libraries listed below
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ210Updated 4 years ago
- The TLS-Scanner Module from TLS-Attackerβ273Updated last month
- Frida Boot π’- A binary instrumentation workshop, with Frida, for beginners!β313Updated last year
- Minimal code to connect to a CEF debugger.β204Updated 4 years ago
- Execute ELF files without dropping them on diskβ491Updated 9 months ago
- Binary Protocol Differβ117Updated 4 years ago
- PageBuster - dump all executable pages of packed processes.β202Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86β¦β127Updated 2 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.β451Updated last week
- Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.β249Updated last year
- The first Linux hooking framework to allow merging two binary files into one!β94Updated 4 years ago
- A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.β208Updated 2 years ago
- d(ockerp)wn - a docker pwn tool managerβ155Updated 3 years ago
- A malware analysis and classification tool.β190Updated 3 years ago
- β229Updated last year
- Burp with Friendsβ102Updated 2 years ago
- A fast and secure multi protocol honeypot.β316Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.β247Updated 4 months ago
- FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulatiβ¦β287Updated 2 years ago
- A Binary Ninja plugin for vulnerability research.β289Updated 6 months ago
- Qubes containerization on Windowsβ129Updated 3 years ago
- A repository of previous info-sec presentations I've presented.β160Updated 4 months ago
- A U-Boot hacking toolkit for security researchers and tinkerersβ267Updated last year
- Checksec tool in Python, Rich output. Based on LIEFβ328Updated 3 weeks ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.β297Updated 3 years ago
- Slide decks from my conference presentationsβ363Updated last year
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.β230Updated last year
- AI-based, context-driven network device rankingβ296Updated last year
- Ghidra scripts for recovering string definitions in Go binariesβ110Updated 4 months ago
- A simple embedded Linux backdoor.β197Updated 4 years ago