braintree / mallory
Reverse proxy for HTTPS services, with SSL verification.
☆59Updated last year
Alternatives and similar repositories for mallory:
Users that are interested in mallory are comparing it to the libraries listed below
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆56Updated 7 years ago
- List of penetration testing tools.☆23Updated 4 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- YAPDNS☆39Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆34Updated 7 years ago
- Domain cralwer for various sites/databases☆9Updated 6 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago