hash3liZer / Proxverter
Cross platform system wide proxy server & TLS Interception library for Python
☆22Updated last year
Alternatives and similar repositories for Proxverter:
Users that are interested in Proxverter are comparing it to the libraries listed below
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- pwncat windows c2 components☆19Updated 3 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- A collection of personal ZAP scripts☆14Updated last year
- Standardizing Security Titles☆13Updated 2 years ago
- ☆14Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.☆13Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- My nim learning experiments☆11Updated 2 years ago