Warxim / petep
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆192Updated last year
Alternatives and similar repositories for petep:
Users that are interested in petep are comparing it to the libraries listed below
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆180Updated 3 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆147Updated last month
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆330Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆157Updated 2 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆336Updated last month
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆153Updated last month
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆329Updated last month
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆147Updated last year
- ☆184Updated 2 years ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆114Updated this week
- The Most Advanced Client-Side Prototype Pollution Scanner☆138Updated this week
- ☆101Updated 2 years ago
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆152Updated 3 weeks ago
- Nuclei templates for honeypots detection.☆196Updated last year
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆109Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆251Updated 8 months ago
- Repository to store exploits created by Assetnotes Security Research team☆175Updated last year
- Massive Mobile Security Framework☆269Updated last week
- A RedTeam Toolkit☆390Updated 2 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆92Updated 6 months ago
- Search for sensitive data in Postman public library.☆194Updated 2 weeks ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆349Updated last week
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 6 months ago
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class…☆258Updated 6 months ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆181Updated last month
- 📲 Enumerate information from an app based on the APK file☆116Updated this week
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆240Updated 11 months ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆91Updated this week
- ☆520Updated 9 months ago
- A streamlined tool for discovering private TLDs for security research.☆171Updated last week