jullrich / pcap2curl
Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.
☆329Updated 2 years ago
Alternatives and similar repositories for pcap2curl:
Users that are interested in pcap2curl are comparing it to the libraries listed below
- Reverse proxy grapher☆398Updated 6 months ago
- HonSSH is designed to log all SSH communications between a client and server.☆373Updated 3 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- ☆351Updated 3 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆241Updated last year
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- Tools for auditing WAFS☆457Updated 4 years ago
- A subdomain enumeration tool.☆896Updated 3 years ago
- Db Database Assessment Tool☆208Updated 6 years ago
- A tool that provides a basic SQL-frontend to PCAP-files☆395Updated 3 months ago
- MAC address age tracking☆576Updated this week
- Current development of SSLyze now takes place on a separate repository☆644Updated 9 years ago
- An intercepting proxy for web application testing☆410Updated 6 years ago
- Minion☆354Updated 5 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A tool to fingerprint SSL/TLS servers☆267Updated 3 years ago
- Git Repository Analyzer.☆146Updated 7 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Go library and command line to seek for secrets on various sources.☆242Updated 5 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- Framework for Testing WAFs (FTW!)☆265Updated last year
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- Haka runtime☆449Updated 7 years ago
- DEPRECATED - A prototype SSH configuration and policy scanner (Blog: https://mozilla.github.io/ssh_scan/)☆789Updated 3 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- CERT Tapioca for MITM network analysis☆182Updated 9 months ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆537Updated 2 years ago
- Nameserver DNS poisoning attacks made easy☆517Updated 7 years ago