mandatoryprogrammer / thermopticLinks
A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.
☆709Updated last week
Alternatives and similar repositories for thermoptic
Users that are interested in thermoptic are comparing it to the libraries listed below
Sorting:
- Tool for reversing Google internal protobuf definitions☆150Updated 5 months ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated 9 months ago
- Use Cloudflare to create HTTP pass-through proxies for unique IP rotation, similar to fireprox☆681Updated last month
- An MCP extension for Ghidra☆335Updated 2 weeks ago
- Scan for secrets in dangling commits on GitHub using GH Archive data.☆404Updated 4 months ago
- An active fork of curl-impersonate with more versions and build targets. A series of patches that make curl requests look like Chrome, Fi…☆2,149Updated 2 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆246Updated last week
- Discover and enumerate all subdomains associated with a website, including those not publicly advertised. Use this tool to conduct thorou…☆145Updated last year
- Zaps arguments and environment from the process list☆235Updated last year
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆154Updated 2 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆132Updated 6 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆333Updated last week
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆206Updated last year
- OSINT tool to find informations about a github user (email2username, username2email, creation date ...)☆539Updated 7 months ago
- the blazing-fast pentesting suite.☆266Updated 2 weeks ago
- Abuse trust-boundaries to bypass firewalls and network controls☆382Updated 3 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆104Updated 5 months ago
- A TLS MITM proxy for TCP/TLS/DTLS/UDP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more.☆290Updated this week
- Extracts and decrypts passwords saved in Firefox.☆209Updated 4 months ago
- Tunnel TCP connections through a file☆967Updated this week
- Use LLMs for document ranking☆156Updated 6 months ago
- Terminal based intercepting proxy written in rust with tmux and vim as user interface.☆421Updated 2 weeks ago
- Reverse engineering and generation toolkit for Chrome's private x-browser-validation header, used for integrity.☆269Updated 4 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 7 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆114Updated 3 months ago
- An experimental high-performance DNS query bruteforce tool built with AF_XDP for extremely fast and accurate bulk DNS lookups.☆233Updated 4 months ago
- Firepwn is a tool made for testing the Security Rules of a firebase application.☆585Updated 3 weeks ago
- Ostorlab KEV: One-command to detect most remotely known exploitable vulnerabilities. Sourced from CISA KEV, Google's Tsunami, Ostorlab's …☆590Updated last month
- Entropy is a CLI tool that will scan your codebase for high entropy lines, which are often secrets.☆715Updated 7 months ago
- WebSocket REPL for pentesters☆227Updated last year