Warxim / deluderLinks
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
☆193Updated 9 months ago
Alternatives and similar repositories for deluder
Users that are interested in deluder are comparing it to the libraries listed below
Sorting:
- Burp Suite extension for testing Passkey systems.☆71Updated 3 months ago
- A delicious, but malicious SSL-VPN server 🌮☆236Updated last month
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆206Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆188Updated 10 months ago
- Search engine for CTF writeups with instant results.☆145Updated 4 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 3 months ago
- ☆115Updated 2 years ago
- Bluetooth Security Assessment Methodology☆133Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 5 months ago
- External Playbooks for Public Access☆39Updated 5 months ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆103Updated last month
- ☆65Updated 2 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 8 months ago
- The most complete code auditing platform with thousands of real-world challenges☆124Updated 3 weeks ago
- ☆80Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆152Updated 5 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆95Updated last week
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆157Updated last year
- ☆40Updated 10 months ago
- Automate converting webshells into reverse shells.☆69Updated 3 weeks ago
- ☆103Updated last week
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 7 months ago
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆66Updated 7 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆38Updated 3 weeks ago
- A public, open source physical security methodology☆46Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- eBPF hacks☆188Updated 7 months ago