A Man in the Middle proof of concept using docker containers
☆21Jul 11, 2021Updated 4 years ago
Alternatives and similar repositories for docker-mitm
Users that are interested in docker-mitm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Apr 27, 2020Updated 6 years ago
- A humble list of hardware hacking tools and resources curated by yours truly☆15Feb 28, 2022Updated 4 years ago
- A demo of Flush-Reload style Side-channel attack.☆10Feb 20, 2019Updated 7 years ago
- A tool collection of various attacks on TLS based on TLS-Attacker☆23Jun 25, 2025Updated 10 months ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- Disassembly Generation and Processing for JARV1S☆15Jul 15, 2025Updated 9 months ago
- ☆17Jul 28, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 11 months ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 4 years ago
- Neo4J visualisation tool for the Code Property Graph☆14May 17, 2021Updated 4 years ago
- ropr with some tweaks for better linux kernel support☆41Apr 25, 2025Updated last year
- convert cgbi png to normal png☆21Oct 24, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- IDA plugin to deobfuscate emotet CFF☆18Apr 26, 2022Updated 4 years ago
- A Kotlin implementation of lox with a JVM backend built using ProGuardCORE☆24Apr 22, 2026Updated last week
- This is a PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆23Jul 21, 2025Updated 9 months ago
- Powerline provides statuslines and prompts for i3, vim, zsh, bash, tmux, IPython, Awesome and Qtile.☆24Dec 29, 2025Updated 4 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 4 months ago
- Parse CTFd scoreboard into CTFtime JSON format.☆13Dec 1, 2025Updated 5 months ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 13 years ago
- Heroes of newerth scripting pack☆19Jan 21, 2023Updated 3 years ago
- Network Based Data Layer: C++ Framework for Managing Application State Across Network☆44Apr 28, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Using a GAN to generate a new dataset☆12Sep 13, 2021Updated 4 years ago
- ☆33May 16, 2018Updated 7 years ago
- Android 10 container system☆50Dec 16, 2024Updated last year
- Found resources in my malware researching adventure.☆17Dec 18, 2022Updated 3 years ago
- My Shellcode Archive☆29Mar 21, 2017Updated 9 years ago
- ☆64Mar 14, 2024Updated 2 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 4 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated 2 years ago
- IoT device scanner with CVE database and many features.☆14Mar 8, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Image Classifier website with Deep Learning using Flask☆14Aug 2, 2019Updated 6 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Fast delegates implementation☆57May 22, 2022Updated 3 years ago
- Artifacts for "ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms" (USENIX Security '24).☆60Jun 19, 2025Updated 10 months ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- BurpSiute - BurpBounty Profiles☆20Feb 10, 2023Updated 3 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Jan 6, 2019Updated 7 years ago