A small and sweet man-in-the-middle proxy capable of doing HTTP and HTTP over SSL.
☆219Mar 17, 2023Updated 3 years ago
Alternatives and similar repositories for pymiproxy
Users that are interested in pymiproxy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 13 years ago
- WARC writing MITM HTTP/S proxy☆447Feb 3, 2026Updated last month
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Captive Portal Evasion Tool☆15Sep 4, 2016Updated 9 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- A full-fledged msfrpc library for Metasploit framework.☆302Aug 31, 2021Updated 4 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Apr 12, 2020Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- Viewer for Observing Multiple Computers using VNC☆19Feb 13, 2010Updated 16 years ago
- Reassembles UDP/TCP packets into application layer messages.☆42Mar 28, 2018Updated 7 years ago
- Sniff packets and POST to API☆15May 22, 2023Updated 2 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Oct 28, 2015Updated 10 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Oct 6, 2019Updated 6 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Dec 8, 2022Updated 3 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆105Aug 8, 2016Updated 9 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Jul 26, 2022Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆18Jul 13, 2020Updated 5 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Black Hat 2017 Talk☆12Jul 31, 2017Updated 8 years ago
- application server attack toolkit☆687Apr 6, 2020Updated 5 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago