Warxim / deluderLinks
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
☆209Updated last month
Alternatives and similar repositories for deluder
Users that are interested in deluder are comparing it to the libraries listed below
Sorting:
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆222Updated 2 years ago
- A delicious, but malicious SSL-VPN server 🌮☆256Updated 2 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 10 months ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 5 months ago
- ☆116Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆112Updated 6 months ago
- Burp Suite extension for testing Passkey systems.☆75Updated 8 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆163Updated 2 years ago
- Search engine for CTF writeups with instant results.☆151Updated 9 months ago
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆185Updated 2 weeks ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Updated 2 months ago
- External Playbooks for Public Access☆40Updated 10 months ago
- eBPF hacks☆188Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆221Updated last year
- Automate converting webshells into reverse shells.☆71Updated last week
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- Bluetooth Security Assessment Methodology☆140Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- PoC_CVEs☆169Updated 3 weeks ago
- ☆93Updated this week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆281Updated 9 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆116Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 7 months ago
- 🏄♂️ Decode and analyze protobuf efficiently.☆134Updated last year
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆83Updated 2 months ago
- A repository of credential stealer formats☆235Updated 6 months ago
- ☆55Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆189Updated last week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆197Updated 4 months ago