VerSprite / alpnpass
This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most SSL stripping solutions this tool will negotiate ALPN and preserve the negotiated protocol all the way to the target.
☆29Updated 3 years ago
Alternatives and similar repositories for alpnpass:
Users that are interested in alpnpass are comparing it to the libraries listed below
- ☆10Updated 2 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Updated last year
- Modular C2 server to tame your pack of wolves☆11Updated last year
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 2 years ago
- A collection of tools for debugging Windows application crashes.☆9Updated 2 years ago
- ☆20Updated 6 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆18Updated 4 years ago
- Tools for analyzing Windows containers and break container's isolation☆29Updated 2 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- ☆21Updated 5 years ago
- A Linux RAT in C☆32Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- Different code-injections techniques under a common tool☆30Updated 4 years ago
- ☆12Updated last year
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆71Updated 5 years ago
- PoC for CVE-2020-11651☆6Updated 4 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆14Updated last year
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated this week
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- A collection of weaponized LPE exploits written in Go☆52Updated last month
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Updated 7 years ago