jullrich / pcap2curlLinks
Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.
☆332Updated 2 years ago
Alternatives and similar repositories for pcap2curl
Users that are interested in pcap2curl are comparing it to the libraries listed below
Sorting:
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆263Updated 7 years ago
- An intercepting proxy for web application testing☆411Updated 6 years ago
- Tools for auditing WAFS☆460Updated 4 years ago
- Db Database Assessment Tool☆209Updated 6 years ago
- Reverse proxy grapher☆399Updated 10 months ago
- ☆352Updated 3 years ago
- Seamlessly spy on SSH session like it is your tty☆349Updated 7 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆576Updated this week
- Go library and command line to seek for secrets on various sources.☆241Updated 5 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆242Updated 2 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆415Updated 2 years ago
- A tool that provides a basic SQL-frontend to PCAP-files☆396Updated 7 months ago
- Haka runtime☆450Updated 7 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated last month
- an osquery fleet manager☆618Updated 2 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- A tool to fingerprint SSL/TLS servers☆268Updated 3 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- Interface to manage and centralize Google Alert information☆231Updated 2 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆217Updated 8 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- SSH/HTTP(S) multiplexer. Run a webserver and a sshd on the same port w/o changes.☆878Updated 2 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago