cyberark / MITM_InterceptLinks
A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
☆215Updated 3 years ago
Alternatives and similar repositories for MITM_Intercept
Users that are interested in MITM_Intercept are comparing it to the libraries listed below
Sorting:
- PoC_CVEs☆169Updated last month
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆113Updated 7 months ago
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- ☆111Updated last year
- A GraphQL enumeration and extraction tool☆134Updated 2 years ago
- ☆97Updated 4 years ago
- Link sources to sinks in C# applications.☆150Updated 2 years ago
- Workshop given at Hack in Paris 2019☆126Updated 2 years ago
- Statically built netcat binaries for Linux (other OSes can be added later)☆37Updated 8 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- ☆170Updated 4 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- A python script to merge multiple jar files for easier debugging via JD-Eclipse☆62Updated 3 years ago
- Collected && Written N day Vulns for study purpose only☆109Updated last month
- Slides and other material from various conference presentations.☆46Updated 4 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 4 months ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- a deterministic finite automata ranker☆73Updated 3 years ago
- ☆65Updated 4 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆67Updated 4 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Updated last year
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 3 years ago
- The following package is the standalone wordlist-only component to flask-unsign.☆43Updated last year
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆105Updated 2 years ago
- Find CVE PoCs on GitHub☆157Updated 5 months ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- ☆116Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆172Updated 2 years ago