mandatoryprogrammer / thermopticLinks
A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.
☆683Updated this week
Alternatives and similar repositories for thermoptic
Users that are interested in thermoptic are comparing it to the libraries listed below
Sorting:
- An MCP extension for Ghidra☆326Updated this week
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆237Updated 2 months ago
- Discover and enumerate all subdomains associated with a website, including those not publicly advertised. Use this tool to conduct thorou…☆145Updated last year
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆140Updated 9 months ago
- Zaps arguments and environment from the process list☆234Updated last year
- the blazing-fast pentesting suite.☆263Updated 6 months ago
- OSINT tool to find informations about a github user (email2username, username2email, creation date ...)☆536Updated 6 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆131Updated 5 months ago
- Tool for reversing Google internal protobuf definitions☆149Updated 5 months ago
- GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for …☆856Updated last year
- Reverse engineering and generation toolkit for Chrome's private x-browser-validation header, used for integrity.☆264Updated 3 months ago
- Scan for secrets in dangling commits on GitHub using GH Archive data.☆404Updated 3 months ago
- Extracts and decrypts passwords saved in Firefox.☆208Updated 3 months ago
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome, Fi…☆2,130Updated 2 months ago
- Terminal based intercepting proxy written in rust with tmux and vim as user interface.☆420Updated 3 weeks ago
- Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox☆636Updated 3 weeks ago
- Burrow is a globally distributed HTTP proxy via AWS Lambda☆242Updated 10 months ago
- Tunnel TCP connections through a file☆966Updated 2 weeks ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆588Updated 2 weeks ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 8 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆151Updated last month
- Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.☆712Updated 7 months ago
- A library for intercepting system calls☆102Updated 9 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆207Updated last year
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆331Updated this week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆251Updated this week
- A web fuzzer using the httpipe format☆101Updated last year
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 6 months ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 6 months ago