Warxim / deluder
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
☆185Updated 6 months ago
Alternatives and similar repositories for deluder:
Users that are interested in deluder are comparing it to the libraries listed below
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆200Updated last year
- ☆114Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 5 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- A Red Team Activity Hub☆205Updated this week
- Get root via TTY / TIOCSTI stuffing☆71Updated 9 months ago
- Azure mindmap for penetration tests☆181Updated last year
- Burp Suite extension for testing Passkey systems.☆66Updated 2 weeks ago
- A delicious, but malicious SSL-VPN server 🌮☆217Updated 4 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆156Updated 4 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Ping-based Information Lookup and Outbound Transfer☆78Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z, jar, war, apk and ipa …☆98Updated last week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆151Updated 5 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆182Updated 7 months ago
- ☆62Updated 4 months ago
- An automatic Blind ROP exploitation tool☆201Updated last year
- ☆92Updated 2 weeks ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Updated last year
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆116Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆142Updated 10 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆62Updated 4 months ago
- reverse shell using curl☆206Updated last month
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆296Updated 4 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆181Updated last month
- ☆534Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated 2 months ago
- Repository to store exploits created by Assetnotes Security Research team☆177Updated last year