Warxim / petep
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆184Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for petep
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆174Updated last month
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆155Updated last week
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆142Updated 2 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆109Updated last year
- ☆183Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆92Updated 4 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆145Updated 10 months ago
- Nuclei templates for honeypots detection.☆192Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆156Updated 6 months ago
- 📲 Enumerate information from an app based on the APK file☆115Updated 3 months ago
- Massive Mobile Security Framework☆252Updated last month
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆100Updated last year
- A WLAN red team framework.☆141Updated last month
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆139Updated last month
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆99Updated this week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆237Updated 9 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆317Updated 10 months ago
- Session Hijacking Visual Exploitation☆193Updated 8 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆133Updated this week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆144Updated 11 months ago
- A GraphQL enumeration and extraction tool☆128Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆84Updated 9 months ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆338Updated 2 months ago
- Azure mindmap for penetration tests☆161Updated 11 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆61Updated 3 years ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆389Updated this week
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 3 months ago
- ☆100Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated 11 months ago
- ☆280Updated 11 months ago