jullrich / pcap2curl
Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.
☆330Updated 2 years ago
Alternatives and similar repositories for pcap2curl:
Users that are interested in pcap2curl are comparing it to the libraries listed below
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Reverse proxy grapher☆398Updated 9 months ago
- Go library and command line to seek for secrets on various sources.☆242Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- CERT Tapioca for MITM network analysis☆183Updated 11 months ago
- Tools for auditing WAFS☆460Updated 4 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆242Updated 2 years ago
- An intercepting proxy for web application testing☆411Updated 6 years ago
- MAC address age tracking☆575Updated this week
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- ☆352Updated 3 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆330Updated last year
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Various Tools and Docker Images☆280Updated last week
- A subdomain enumeration tool.☆897Updated 3 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- A tool that provides a basic SQL-frontend to PCAP-files☆396Updated 5 months ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Example of Linux SO_REUSEPORT☆91Updated 7 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆197Updated 8 years ago
- Detection script for the ROBOT vulnerability☆271Updated 2 years ago
- Cleans out "open" wireless connections from OSX machine☆152Updated 4 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆520Updated 8 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- Project Sonar☆236Updated 2 months ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆321Updated 7 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago