Warxim / petep
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆200Updated last year
Alternatives and similar repositories for petep:
Users that are interested in petep are comparing it to the libraries listed below
- Nuclei templates for honeypots detection.☆196Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆148Updated 4 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆187Updated 6 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆334Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated last year
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class…☆270Updated 9 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆156Updated 4 months ago
- 📲 Enumerate app information through the APK file☆122Updated last month
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆287Updated last year
- ☆187Updated 2 years ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆357Updated this week
- A rapid HTTP downgrade smuggling scanner written in Go.☆254Updated 11 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆129Updated this week
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆103Updated last year
- WebSocket REPL for pentesters☆218Updated 8 months ago
- ☆168Updated 7 months ago
- Docker Remote API Scanner and Exploit☆171Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆219Updated this week
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆159Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆96Updated 9 months ago
- The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who …☆120Updated 2 years ago
- Session Hijacking Visual Exploitation☆198Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 5 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆90Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 11 months ago
- ☆298Updated last month
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated last year
- Massive Mobile Security Framework☆277Updated 2 months ago
- Azure mindmap for penetration tests☆181Updated last year