johndoe31415 / ratchedView external linksLinks
Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing
☆33Jul 19, 2021Updated 4 years ago
Alternatives and similar repositories for ratched
Users that are interested in ratched are comparing it to the libraries listed below
Sorting:
- Networking exploration in golang to build a security enhanced version of netcat☆10Feb 20, 2018Updated 7 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆15Nov 3, 2017Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Node.js DTLS Proxy, library and tools to connect plain-text UDP clients with plain-text UDP servers over an encrypted UDP tunnel..☆14Dec 2, 2018Updated 7 years ago
- port scanner & login credential tester☆15Mar 25, 2019Updated 6 years ago
- This repository contains some bettercap transparent proxy example modules.☆16Nov 28, 2017Updated 8 years ago
- Clone of w1.fi hostap.git - NOTE: This is not the main development location and pull requests for this repository are ignored. See the up…☆15Feb 27, 2020Updated 5 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ☆26Feb 5, 2024Updated 2 years ago
- DHCP attack tool☆21Oct 4, 2024Updated last year
- rev shell and manager in go☆20Feb 25, 2020Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 5 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Exploit framework written in Go☆29Mar 2, 2018Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Nov 29, 2017Updated 8 years ago
- Security tool to quickly audit Public Box files and folders.☆54Sep 29, 2019Updated 6 years ago
- Lightweight utility to fool port scanners☆32Feb 28, 2020Updated 5 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Aug 13, 2018Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Python version of OWASP's DirBuster Application.☆29Dec 18, 2014Updated 11 years ago
- A packer project to generate Windows EVAL images to use it on test / dev / hack / IR labs☆24Jan 3, 2021Updated 5 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Apr 5, 2023Updated 2 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Open source entropy based invalid traffic detection and pre-bid filtering.☆71Sep 6, 2019Updated 6 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Feb 24, 2020Updated 5 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆24Feb 7, 2026Updated last week
- OpenWrt Hostpot/Logging/Qos Management Bash Service☆13Sep 9, 2024Updated last year
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago