braintree / mallory
Reverse proxy for HTTPS services, with SSL verification.
☆60Updated last year
Alternatives and similar repositories for mallory
Users that are interested in mallory are comparing it to the libraries listed below
Sorting:
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Script for doing evil stuff to Redis servers (for educational purposes only).☆71Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- YAPDNS☆39Updated 9 years ago
- ☆78Updated 9 years ago
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Minion Backend☆40Updated 6 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- SSH Multipot☆22Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- ☆63Updated 12 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago