battalkoc / mitm-defenseView external linksLinks
☆11Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for mitm-defense
Users that are interested in mitm-defense are comparing it to the libraries listed below
Sorting:
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Learn LangChain for Genearative AI with OpenAI API using Python☆11Feb 15, 2024Updated last year
- ☆10Jul 8, 2024Updated last year
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago
- ☆10Jul 5, 2021Updated 4 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- Small tool to decode ASP.NET __VIEWSTATE variable when doing webpentests☆15Feb 27, 2021Updated 4 years ago
- A tool to attack ARP☆15May 27, 2021Updated 4 years ago
- Mixed work on Golang for new improvements and practicality.☆15Aug 15, 2022Updated 3 years ago
- automated sticky keys backdoor☆10Feb 12, 2016Updated 10 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- ☆15May 6, 2023Updated 2 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 4 years ago
- Android hakkında önemli olan bilgileri depolama☆17Mar 15, 2017Updated 8 years ago
- Starting files for End-of-Chapter Projects for Third Edition☆22Mar 21, 2023Updated 2 years ago
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 3 years ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- ☆70Feb 21, 2022Updated 3 years ago
- Arka Kapi Digital Library - https://read.arkakapimag.com☆13Jan 3, 2023Updated 3 years ago
- Metamorphic Code Generator & Loader☆15Dec 7, 2020Updated 5 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 3 years ago
- ☆18Jul 9, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/bones7456☆16Jan 2, 2026Updated last month
- All you need about Active Directory☆16Jul 22, 2021Updated 4 years ago
- OpenCV ile Nesne Tespiti Uygulamaları☆20Apr 21, 2022Updated 3 years ago
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆24Dec 13, 2019Updated 6 years ago
- MySQL User Defined Functions Exploitation to RCE or PrivEsc Simple Cheat Sheet.☆22May 13, 2022Updated 3 years ago
- DNS isteklerini veya trafiği kendi istediğiniz yere yönlendirerek hedef web sitesini manipüle etmenize yarayan bir script.☆14Jun 24, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Jan 5, 2021Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆27Sep 13, 2016Updated 9 years ago
- Docker setup for Pupy☆28Jul 23, 2023Updated 2 years ago
- Discord bot dashboard system.☆14Jan 27, 2022Updated 4 years ago
- Cloudflare Bypass Script☆23Dec 12, 2019Updated 6 years ago
- ☆24Dec 29, 2025Updated last month
- ETİK HACKER EL KİTABI #1 KENDİMİ SİBER GÜVENLİK ALANINDA GELİŞTİRMEYE ÇALIŞIYORUM VE BU ZAMAN İÇİNDE ELİME GEÇEN HER ŞEYİ DEĞERLENDİRMEYE…☆27Apr 23, 2024Updated last year
- React JS Product Landing Page | Animate On Scroll☆25Nov 14, 2022Updated 3 years ago