Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.
☆64Aug 17, 2025Updated 7 months ago
Alternatives and similar repositories for fiddleitm
Users that are interested in fiddleitm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unauthenticated RCE exploit for CVE-2024-25600 in WordPress Bricks Builder <= 1.9.6. Executes arbitrary code remotely.☆13Apr 5, 2025Updated 11 months ago
- The VPN Rotator is a Bash/Debian framework for security researchers eager to protect their residential IP and wanting to replay malware t…☆66May 26, 2025Updated 9 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Chess live interface☆12Oct 25, 2025Updated 4 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆37Mar 13, 2016Updated 10 years ago
- KQL queries for Incident Response☆14Oct 31, 2023Updated 2 years ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- ☆29Jun 18, 2025Updated 9 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- Hacked up scripts to perform google searches☆16Apr 26, 2024Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆113Mar 19, 2025Updated last year
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆22Apr 16, 2021Updated 4 years ago
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated last month
- Little toolkit wrote in C to extract GPS data from Dash Cam 70mai Pro MP4 files to SRT (subtitles)☆11Jun 10, 2020Updated 5 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- Kubernetes simplified, containerized, and democratized for rootless environments.☆41Dec 10, 2025Updated 3 months ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆16Apr 6, 2015Updated 10 years ago
- ☆12Feb 1, 2022Updated 4 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆32Jul 7, 2025Updated 8 months ago
- A search tool that can find exposed email addresses and mobile numbers on Internet.☆16May 12, 2024Updated last year
- kubernetes operator manager☆16Jun 23, 2025Updated 9 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Track PostNord letters, parcels and pallets by their item ID number☆13Dec 5, 2016Updated 9 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆186Feb 9, 2025Updated last year
- ☆75Jul 12, 2025Updated 8 months ago