Warxim / petepLinks
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆222Updated 2 years ago
Alternatives and similar repositories for petep
Users that are interested in petep are comparing it to the libraries listed below
Sorting:
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- ☆196Updated 2 years ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆134Updated 2 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated last month
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆152Updated 2 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆155Updated 3 months ago
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆119Updated this week
- Search for sensitive data in Postman public library.☆216Updated 3 months ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 7 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆243Updated this week
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆114Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Automate Scoping, OSINT and Recon assessments.☆98Updated last month
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆101Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆69Updated last year
- Burp Suite extension for testing Passkey systems.☆75Updated 8 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆83Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated last month
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆332Updated 3 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆164Updated last year
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆291Updated 3 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated last year
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆33Updated 2 years ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year