ivision-research / MalloryView external linksLinks
☆13May 28, 2013Updated 12 years ago
Alternatives and similar repositories for Mallory
Users that are interested in Mallory are comparing it to the libraries listed below
Sorting:
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Tutorial for Node.js security☆21Sep 4, 2020Updated 5 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Tiny evIl Man in the Middle - Timmy☆19Oct 31, 2016Updated 9 years ago
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆17Feb 10, 2016Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- IRMA ansible☆24Nov 28, 2016Updated 9 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Feb 1, 2024Updated 2 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Windows Offline Common Password Hash Checker☆29Aug 9, 2016Updated 9 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 10 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- Resources and tools for testing and interacting with Chef and Chef Server.☆39Jan 27, 2026Updated 2 weeks ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- DEPRECATED: Easier, More Powerful Chef Resources☆26Sep 13, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 weeks ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- tcprelay.py with support for multiple iDevices☆40Mar 27, 2016Updated 9 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Add a simple GUI for SWUpdate in rescue mode.☆10May 31, 2024Updated last year
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 7 years ago
- ☆10Feb 3, 2026Updated last week
- d3-hierarchy 中文☆10Jul 22, 2019Updated 6 years ago