Replay HTTP and HTTPS requests from a PCAP based on TLS Master Secrets.
☆96Dec 8, 2021Updated 4 years ago
Alternatives and similar repositories for httpreplay
Users that are interested in httpreplay are comparing it to the libraries listed below
Sorting:
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Cockroach is your primitive & immortal swiss army knife.☆48Dec 8, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 10 months ago
- fiddler output to pcap☆41Mar 17, 2014Updated 11 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Detection of TEEs on Android devices☆29Jan 2, 2016Updated 10 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- The Multiplatform Linux Sandbox☆266Jan 3, 2022Updated 4 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- Collection of my Python Scripts☆41Aug 14, 2020Updated 5 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.☆516May 14, 2024Updated last year
- Malicious HTTP traffic explorer☆724Mar 16, 2023Updated 2 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- Reference implementation of Curve25519 and Curve448 as specified in RFC7748☆10Jun 22, 2019Updated 6 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- CANAPE Network Testing Tool☆34Sep 25, 2018Updated 7 years ago
- Control Flow Graph Scanning for Android☆63May 26, 2015Updated 10 years ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Mar 24, 2017Updated 8 years ago