Warxim / petepLinks
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆217Updated last year
Alternatives and similar repositories for petep
Users that are interested in petep are comparing it to the libraries listed below
Sorting:
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆205Updated last year
- ☆195Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆149Updated last month
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated 3 weeks ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆135Updated this week
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated 3 weeks ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆240Updated this week
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- Search for sensitive data in Postman public library.☆213Updated last month
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆162Updated 5 months ago
- ☆94Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆108Updated 4 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆109Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆35Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆67Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆50Updated 3 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Nuclei templates for honeypots detection.☆195Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- Automate Scoping, OSINT and Recon assessments.☆97Updated last week
- Search for all leaked keys/secrets using one regex! bugbounty☆140Updated 6 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆163Updated 10 months ago
- This repository contains information on the CVEs I found.☆49Updated last year
- Analyze Android native `.so` files☆84Updated 2 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆79Updated last year
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆178Updated last year