VerSprite / alpnpassLinks
This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most SSL stripping solutions this tool will negotiate ALPN and preserve the negotiated protocol all the way to the target.
☆31Updated 3 years ago
Alternatives and similar repositories for alpnpass
Users that are interested in alpnpass are comparing it to the libraries listed below
Sorting:
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- An evil bit backdoor for iptables☆53Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- ☆20Updated 6 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated last month
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- reverse socks tunneler with ntlm and proxy support☆57Updated 3 years ago
- Self-healing RAT utilizing libp2p☆88Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago
- ☆27Updated 4 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Shellcode process injector☆28Updated 5 years ago
- ☆12Updated last year
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 6 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- Unpacking tool for the zipExec Crypter☆14Updated 3 years ago
- c# reverse shell poc☆27Updated 6 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- Let's try to create a rootkit!☆20Updated 5 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆17Updated 2 weeks ago
- inject and run code into arbitrary process (x86 and x64)☆13Updated 3 years ago
- reverse socks tunneler with ntlm and proxy support☆28Updated 5 years ago