Warxim / deluderLinks
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
☆192Updated 8 months ago
Alternatives and similar repositories for deluder
Users that are interested in deluder are comparing it to the libraries listed below
Sorting:
- ☆115Updated 2 years ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆206Updated last year
- A suite of services (SOCKS, FTP, shell, etc.) over Citrix, VMware Horizon and native Windows RDP virtual channels.☆248Updated this week
- A delicious, but malicious SSL-VPN server 🌮☆233Updated 2 weeks ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆162Updated 7 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆100Updated 4 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆157Updated last year
- Burp Suite extension for testing Passkey systems.☆69Updated 2 months ago
- Azure mindmap for penetration tests☆186Updated last year
- ☆298Updated 3 months ago
- ☆182Updated 7 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- A Red Team Activity Hub☆209Updated last week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆188Updated 9 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆148Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆158Updated 7 months ago
- The most complete code auditing platform with thousands of real-world challenges☆120Updated last week
- nysm is a stealth post-exploitation container.☆250Updated last week
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆198Updated 2 months ago
- ☆80Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆372Updated last month
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆119Updated last year
- Automate converting webshells into reverse shells.☆69Updated this week
- Get root via TTY / TIOCSTI stuffing☆76Updated last month
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 7 months ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆258Updated last year