SySS-Research / hallucinateLinks
One-stop TLS traffic inspection and manipulation using dynamic instrumentation
☆242Updated 2 years ago
Alternatives and similar repositories for hallucinate
Users that are interested in hallucinate are comparing it to the libraries listed below
Sorting:
- Minimal code to connect to a CEF debugger.☆207Updated 5 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆318Updated last year
- Execute ELF files without dropping them on disk☆494Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆136Updated 2 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- The TLS-Scanner Module from TLS-Attacker☆276Updated this week
- ☆246Updated 4 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- Binary Protocol Differ☆119Updated 5 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 8 months ago
- PCAP visualization tool☆103Updated 2 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated last month
- ☆182Updated 5 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 5 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 8 months ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- ☆231Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆337Updated 3 weeks ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆209Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆193Updated 9 months ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆206Updated 3 years ago
- SNIcat☆126Updated 3 years ago
- An extensively configurable tool providing a summary of the changes between two files or directories, ignoring all the fluff you don't ca…☆202Updated 2 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 5 years ago
- Basic Electron Exploitation☆211Updated 5 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆304Updated 3 years ago
- Exploit Development, Reverse Engineering & Cryptography☆254Updated 4 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆298Updated 5 months ago