mandatoryprogrammer / thermopticLinks
A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.
☆432Updated last week
Alternatives and similar repositories for thermoptic
Users that are interested in thermoptic are comparing it to the libraries listed below
Sorting:
- Zaps arguments and environment from the process list☆230Updated last year
- Discover and enumerate all subdomains associated with a website, including those not publicly advertised. Use this tool to conduct thorou…☆140Updated 11 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆230Updated last month
- Tool for reversing Google internal protobuf definitions☆146Updated 4 months ago
- A TLS MITM proxy for TCP/TLS/UDP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more.☆216Updated 2 weeks ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆129Updated 4 months ago
- An archive of 0day.today exploits☆180Updated 2 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆330Updated this week
- Scan for secrets in dangling commits on GitHub using GH Archive data.☆383Updated 3 months ago
- An MCP extension for Ghidra☆319Updated last month
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆135Updated last month
- Reverse engineering and generation toolkit for Chrome's private x-browser-validation header, used for integrity.☆257Updated 2 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆206Updated last year
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆138Updated 8 months ago
- the blazing-fast pentesting suite.☆255Updated 5 months ago
- Use LLMs for document ranking☆148Updated 5 months ago
- Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox☆189Updated last week
- WebSocket REPL for pentesters☆225Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆233Updated 7 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆110Updated 2 months ago
- Terminal based intercepting proxy written in rust with tmux and vim as user interface.☆418Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 4 months ago
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆179Updated last year
- Abuse trust-boundaries to bypass firewalls and network controls☆375Updated 2 months ago
- Extracts and decrypts passwords saved in Firefox.☆208Updated 2 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆265Updated this week
- A library for intercepting system calls☆102Updated 9 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆83Updated last week
- Qtap: An eBPF agent that captures pre-encrypted network traffic, providing rich context about egress connections and their originating pr…☆1,344Updated 2 weeks ago
- Hides message with invisible Unicode characters☆94Updated last year