Warxim / petep
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆193Updated last year
Alternatives and similar repositories for petep:
Users that are interested in petep are comparing it to the libraries listed below
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆182Updated 4 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆147Updated 2 months ago
- ☆185Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆95Updated 7 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆156Updated 3 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆109Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆152Updated 2 months ago
- A Slack bot phishing framework for Red Teaming exercises☆164Updated 9 months ago
- Azure mindmap for penetration tests☆175Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆350Updated 10 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆87Updated last year
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆348Updated last month
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆59Updated 2 months ago
- Docker Remote API Scanner and Exploit☆160Updated last year
- The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who …☆113Updated last year
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆139Updated 8 months ago
- Nuclei templates for honeypots detection.☆196Updated last year
- 📲 Enumerate information from an app based on the APK file☆118Updated this week
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 2 weeks ago
- Session Hijacking Visual Exploitation☆194Updated 11 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆96Updated 3 weeks ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 7 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆135Updated 9 months ago
- Massive Mobile Security Framework☆272Updated this week
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆149Updated last year
- The Most Advanced Client-Side Prototype Pollution Scanner☆146Updated this week
- ☆165Updated 5 months ago
- A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.☆346Updated last week
- Huge Collection of Wordpress Exploits and CVES☆123Updated 2 years ago