Warxim / deluder
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
☆173Updated last month
Related projects ⓘ
Alternatives and complementary repositories for deluder
- eBPF hacks☆173Updated 2 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆237Updated 9 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆78Updated 8 months ago
- ☆115Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 6 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆184Updated 11 months ago
- Get root via TTY / TIOCSTI stuffing☆63Updated 3 months ago
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆85Updated this week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆131Updated 2 months ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆111Updated 5 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆62Updated 9 months ago
- ☆180Updated last month
- Azure mindmap for penetration tests☆161Updated 11 months ago
- ☆281Updated 11 months ago
- A Red Team Activity Hub☆171Updated this week
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆175Updated 2 months ago
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆142Updated this week
- An interactive shell to spoof some LOLBins command line☆179Updated 9 months ago
- An automatic Blind ROP exploitation tool☆189Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆247Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆116Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆338Updated 2 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆58Updated 4 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆171Updated 9 months ago
- nysm is a stealth post-exploitation container.☆237Updated 10 months ago
- ☆55Updated 3 weeks ago
- ☆169Updated last month
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆154Updated last week
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆143Updated 7 months ago
- Azure DevOps Services Attack Toolkit☆259Updated 3 months ago