mandatoryprogrammer / thermopticLinks
A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.
☆154Updated this week
Alternatives and similar repositories for thermoptic
Users that are interested in thermoptic are comparing it to the libraries listed below
Sorting:
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆228Updated 2 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆107Updated last month
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆67Updated last month
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 4 months ago
- A TLS MITM proxy for Non-HTTP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more.☆146Updated last week
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆145Updated last year
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆283Updated 2 weeks ago
- IPSpinner works as a local proxy that redirects requests through external services.☆74Updated 5 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated last month
- Java archive implant toolkit.☆61Updated 4 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆117Updated last month
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆66Updated last week
- Exploits Unauth Docker API☆41Updated 4 months ago
- PoC that downloads an executable from a public SSL certificate☆127Updated last month
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 5 months ago
- Tail Certificate Transparency logs and extract hostnames☆123Updated 2 months ago
- Covert data exfiltration via DNS☆48Updated 6 months ago
- Burp Suite extension for testing Passkey systems.☆73Updated 5 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated 2 weeks ago
- ☆42Updated last year
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆43Updated 8 months ago
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- Seamless remote browser session control☆207Updated last month
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆161Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 3 months ago
- Hijack a slack bot to phish your way in☆56Updated last month
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 4 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆146Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago