VerSprite / alpnpassLinks
This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most SSL stripping solutions this tool will negotiate ALPN and preserve the negotiated protocol all the way to the target.
☆31Updated 4 years ago
Alternatives and similar repositories for alpnpass
Users that are interested in alpnpass are comparing it to the libraries listed below
Sorting:
- DDoor - cross platform backdoor using dns txt records☆30Updated 4 years ago
- reverse socks tunneler with ntlm and proxy support☆60Updated 3 years ago
- Shellcode process injector☆28Updated 5 years ago
- ☆27Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Shellcode library as a Go package☆70Updated 6 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆75Updated 6 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- ☆12Updated 2 years ago
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Updated 3 years ago
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago
- E2E encryption for multi-hop tty sessions or portshells + TCP/UDP port forward☆130Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 6 years ago
- Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019☆59Updated 4 years ago
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343…☆43Updated 5 years ago
- An evil bit backdoor for iptables☆54Updated 4 years ago
- Red Team C2 and Post Exploitation code☆34Updated 6 months ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- PAM Backdoor☆33Updated 2 years ago
- DNS server for pentesters☆50Updated 2 months ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- ☆13Updated 4 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆68Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- ☆20Updated 6 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆140Updated 3 years ago