Ruby In The Middle (HTTP/HTTPS interception proxy)
☆101Dec 13, 2021Updated 4 years ago
Alternatives and similar repositories for ritm
Users that are interested in ritm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A ruby http/https proxy to do EVIL things.☆180Oct 30, 2023Updated 2 years ago
- Get information client with getdatareport (Plugin)☆25Oct 18, 2016Updated 9 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- scrapin' proxies with ocr☆19Jun 19, 2018Updated 7 years ago
- Interactively update your outdated gems☆99Jul 2, 2015Updated 10 years ago
- Shodan HQ nmap plugin - passively scan targets☆157Mar 14, 2016Updated 10 years ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago
- CDN distribution for Opal.☆12Aug 8, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆16Jun 30, 2023Updated 2 years ago
- Nif for running lua inside erlang☆15Jun 15, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆328Jun 25, 2022Updated 3 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- ☆15Dec 18, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆206Sep 6, 2018Updated 7 years ago
- HTTP API Client Builder☆17Dec 10, 2025Updated 3 months ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Aug 10, 2014Updated 11 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Branch.io command line interface☆14Mar 26, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- Viper is a brute-force password cracker.☆24Feb 10, 2016Updated 10 years ago
- Network traffic sensor☆115Jun 8, 2022Updated 3 years ago
- PacketFu, a mid-level packet manipulation library for Ruby☆394Jun 28, 2023Updated 2 years ago