hash3liZer / ProxverterLinks
Cross platform system wide proxy server & TLS Interception library for Python
☆22Updated last year
Alternatives and similar repositories for Proxverter
Users that are interested in Proxverter are comparing it to the libraries listed below
Sorting:
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Man in the Browser Framework☆50Updated 7 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Updated 2 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 3 years ago
- Encrypt your git repo...☆48Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Ruby ARP Toolkit☆14Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- ☆23Updated 5 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆14Updated last year
- ☆16Updated 3 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆21Updated 6 months ago
- ☆25Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago