Warxim / petepLinks
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
☆223Updated 2 years ago
Alternatives and similar repositories for petep
Users that are interested in petep are comparing it to the libraries listed below
Sorting:
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆111Updated 2 years ago
- ☆198Updated 3 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆154Updated 4 months ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- As a bug hunter, are your bug bounty reports getting rejected because you don't use a "malicious" Proof of Concept (PoC) app to exploit t…☆128Updated last month
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆159Updated 5 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated 2 years ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆243Updated this week
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆113Updated 8 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Updated 3 months ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆141Updated 3 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆146Updated 2 weeks ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Automate converting webshells into reverse shells.☆72Updated last week
- Search for sensitive data in Postman public library.☆214Updated 5 months ago
- Massive Mobile Security Framework☆299Updated last week
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆165Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- Automate Scoping, OSINT and Recon assessments.☆103Updated last week
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆33Updated 2 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Updated 3 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆95Updated 4 months ago
- Session Hijacking Visual Exploitation☆210Updated last year