Warxim / petepView external linksLinks
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆224Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for petep
Users that are interested in petep are comparing it to the libraries listed below
Sorting:
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Nov 14, 2025Updated 2 months ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆131Jun 1, 2024Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆27Mar 20, 2024Updated last year
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Jun 30, 2021Updated 4 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and …☆363Mar 28, 2025Updated 10 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 8 months ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆99Sep 9, 2023Updated 2 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Feb 20, 2024Updated last year
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆103Dec 8, 2025Updated 2 months ago
- APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is int…☆948Jan 17, 2025Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- Hax is a mini-tool with really useful hacking tools.☆20May 9, 2023Updated 2 years ago
- eBPF hacks☆195Dec 12, 2024Updated last year
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆143Jun 22, 2025Updated 7 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆283May 16, 2025Updated 8 months ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Feb 22, 2024Updated last year
- Rust in-memory dumper☆108Jul 26, 2023Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- ☆24Nov 18, 2023Updated 2 years ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆370May 22, 2023Updated 2 years ago
- OSCP Study Guide☆42Oct 10, 2022Updated 3 years ago
- Golang weaponization for red teamers.☆516Jan 17, 2024Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Oct 10, 2023Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆18Mar 26, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆264Dec 15, 2025Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆772Jan 26, 2026Updated 2 weeks ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Jan 12, 2024Updated 2 years ago
- ☆567Mar 28, 2024Updated last year