VerSprite / alpnpass
This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most SSL stripping solutions this tool will negotiate ALPN and preserve the negotiated protocol all the way to the target.
☆31Updated 3 years ago
Alternatives and similar repositories for alpnpass
Users that are interested in alpnpass are comparing it to the libraries listed below
Sorting:
- Shellcode process injector☆27Updated 4 years ago
- ☆33Updated 4 years ago
- ☆20Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- ☆12Updated last year
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- ☆27Updated 4 years ago
- ☆10Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A collection of tools for debugging Windows application crashes.☆9Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- A reduced functionality cli client for the imdisk ram disk driver. To be used through a backdoor like meterpreter☆22Updated 6 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Modular C2 server to tame your pack of wolves☆12Updated 3 weeks ago
- c# reverse shell poc☆27Updated 6 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Updated 4 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆21Updated 2 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- ☆11Updated 6 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago