VerSprite / alpnpassLinks
This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most SSL stripping solutions this tool will negotiate ALPN and preserve the negotiated protocol all the way to the target.
☆31Updated 4 years ago
Alternatives and similar repositories for alpnpass
Users that are interested in alpnpass are comparing it to the libraries listed below
Sorting:
- DDoor - cross platform backdoor using dns txt records☆30Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆60Updated 3 years ago
- ☆27Updated 5 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆132Updated last year
- Utility to inject honey tokens into lsass.☆28Updated 9 years ago
- Shellcode process injector☆28Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆76Updated 6 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Updated 3 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- ☆20Updated 6 years ago
- DNS server for pentesters☆50Updated 3 months ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Shellcode library as a Go package☆70Updated 6 years ago
- ☆33Updated 5 years ago
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Updated 4 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆52Updated 4 years ago
- ☆12Updated 2 years ago
- This tool was open sourced as part of JARM Randomizer: Evading JARM Fingerprinting for HiTB Amsterdam 2021.☆49Updated 2 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- Simple unpacking script for Ezuri ELF Crypter☆37Updated 4 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Red Team C2 and Post Exploitation code☆34Updated 7 months ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- The program is designed to dump full memory of the process by specifing process name or process id.☆41Updated 6 years ago
- ReVBShell - Reverse VBS Shell☆83Updated 3 months ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆114Updated 4 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago