Warxim / deluder
Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock and Linux Sockets out of the box. ⚡
☆181Updated 3 months ago
Alternatives and similar repositories for deluder:
Users that are interested in deluder are comparing it to the libraries listed below
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆191Updated last year
- ☆115Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆154Updated 4 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 2 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆59Updated 2 months ago
- A delicious, but malicious SSL-VPN server 🌮☆200Updated 2 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆241Updated last year
- eBPF hacks☆181Updated last month
- Ping-based Information Lookup and Outbound Transfer☆76Updated 9 months ago
- ☆176Updated 2 months ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated 10 months ago
- WebSocket REPL for pentesters☆214Updated 6 months ago
- Automate converting webshells into reverse shells.☆67Updated this week
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆350Updated 2 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆136Updated 2 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆113Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆140Updated 8 months ago
- Bluetooth Security Assessment Methodology☆112Updated 8 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆82Updated last month
- Automatically detect potential vulnerabilities and analyze repository metrics to prioritize open source security research targets☆205Updated 2 months ago
- An automatic Blind ROP exploitation tool☆195Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆153Updated 2 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆123Updated 9 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆63Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- A Red Team Activity Hub☆185Updated this week
- A repository of credential stealer formats☆172Updated last week
- Get root via TTY / TIOCSTI stuffing☆68Updated 6 months ago
- Repository to store exploits created by Assetnotes Security Research team☆175Updated last year
- Azure mindmap for penetration tests☆175Updated last year