Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
☆212Nov 14, 2025Updated 4 months ago
Alternatives and similar repositories for deluder
Users that are interested in deluder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆226Dec 1, 2023Updated 2 years ago
- ☆144Mar 10, 2026Updated 2 weeks ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆80Mar 7, 2026Updated 3 weeks ago
- A tech enumeration toolkit focused on 404 Not found pages.☆27Oct 6, 2024Updated last year
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆281Sep 11, 2025Updated 6 months ago
- ☆29Jun 20, 2025Updated 9 months ago
- Quickly find all identities someone has used on their Github commits☆16Jul 28, 2024Updated last year
- ☆568Mar 28, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.☆473Mar 20, 2026Updated last week
- experimental wildcard subdomain filtering prototype☆14Aug 5, 2023Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆460Mar 10, 2026Updated 2 weeks ago
- ☆16May 29, 2024Updated last year
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 4 months ago
- smbcrawler is no-nonsense tool that takes credentials and a list of hosts and 'crawls' (or 'spiders') through those shares☆190Nov 19, 2025Updated 4 months ago
- A Project for people to study android svc.☆25Aug 12, 2022Updated 3 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆823Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Signature based honeypot detector tool written in Golang☆110Mar 22, 2025Updated last year
- ☆23Mar 17, 2024Updated 2 years ago
- Spoofing desktop login applications with WinForms and WPF☆177Feb 19, 2024Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Mar 27, 2024Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆396Sep 26, 2023Updated 2 years ago
- Execute ELF files without dropping them on disk☆503Jun 28, 2024Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆372Updated this week
- Burp HTTP history browser (bhhb) - A tool to view HTTP history exported from Burp Suite Community Edition☆133Nov 19, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- APK downloader from few sources☆137Aug 18, 2025Updated 7 months ago
- Draw on Canvas based Overlay with RootService☆19Apr 13, 2024Updated last year
- Mara is a userland pty/tty sniffer☆53Dec 22, 2023Updated 2 years ago
- Tool to scan servers and hosts using dynamic paths.