MitM proxy which performs opportunistic SSL/TLS stripping
☆17Nov 5, 2019Updated 6 years ago
Alternatives and similar repositories for StopTLS
Users that are interested in StopTLS are comparing it to the libraries listed below
Sorting:
- 不到100行代码实现一个Python迷你内网穿透、反向正向代理小工具☆12May 27, 2023Updated 2 years ago
- arp欺骗(可实现内网流量劫持)☆10May 1, 2020Updated 5 years ago
- Hack accounts and passwords on Asterisk servers☆17Mar 16, 2015Updated 11 years ago
- Mobile application and IoT network analysis automation tool.☆11May 9, 2019Updated 6 years ago
- MikroTik (RouterOS) to MQTT☆11Jul 15, 2021Updated 4 years ago
- An Application for Spoofing Movement written in Golang☆18Aug 6, 2016Updated 9 years ago
- A tool that can scramble any file by rearranging the bytes it consists of—rendering it unreadable; and also unscramble any scrambled file…☆15May 11, 2021Updated 4 years ago
- TV show scraper/renamer thingy☆12May 10, 2013Updated 12 years ago
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- Simulation of regular login activity on a site and random activity from a hacker using a brute-force password guessing attack.☆15Mar 17, 2023Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Sep 11, 2016Updated 9 years ago
- ☆14Feb 18, 2023Updated 3 years ago
- Ansible role for RedHat Enterprise Linux release 8 following the CIS Benchmarks☆21Jan 9, 2022Updated 4 years ago
- A daemon that manages SELinux policies on a filesystem☆41Dec 3, 2025Updated 3 months ago
- moduled sniffer TCP/UDP Proxy for man-in-the-middle attack☆16Aug 8, 2018Updated 7 years ago
- ☆17Sep 15, 2025Updated 6 months ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- A fast dictionary attack tool (700,000+ candidates per second), that attacks a supported hash with a user-defined dictionary file's candi…☆22May 3, 2021Updated 4 years ago
- USB Type C charger for laptops or phones, that uses generic DC inputs as the source.☆16Jun 10, 2017Updated 8 years ago
- How many implementations of the isEven() function can we get?☆14May 1, 2025Updated 10 months ago
- rant blog about CryptoTrooper ransomware, its history, legacy and MalwareTech case☆12Jan 26, 2019Updated 7 years ago
- Automatic generation of YARA rules from sample files.☆28Apr 10, 2025Updated 11 months ago
- Fake access point using dns spoof and ssl stripping☆21Feb 14, 2018Updated 8 years ago
- Tests Kubernetes clusters for adherence to security best practices using kube-bench.☆44Updated this week
- Hack Anyone's WiFi☆16Oct 2, 2023Updated 2 years ago
- BUILD YOUR OWN BLOCKCHAIN: A PYTHON TUTORIAL Download the full Jupyter/iPython notebook from Github here Build Your Own Blockchain – The…☆19Jun 15, 2019Updated 6 years ago
- Hikvision IP camera access bypass exploit, developed by golang.☆12Updated this week
- Email delivery for asyncio.☆27Dec 16, 2024Updated last year
- ☆25Jul 30, 2017Updated 8 years ago
- TangGo的自定义界面工具模块设计和分享的第三方工具界面☆11Nov 27, 2024Updated last year
- 多平台发布☆10Mar 16, 2021Updated 5 years ago
- 这个项目存放了我编写的所有关于监控设备的脚本,并使用flask搭建WEB展示扫描的结果☆10Feb 21, 2017Updated 9 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- Rust client library for @tailscale.☆11Oct 5, 2022Updated 3 years ago
- golang 练手项目,对目标资产进行目录和文件爆破,利用相似性汉明距离清除误报页面。☆12Apr 21, 2022Updated 3 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- KUMPULAN CODE TERMUX LENGKAP | SPAM CHAT WHATSAPP || nggk usah nyepam gw -_* atau hp lu gw ledakin!!#@vms $ pkg update && pkg upgrade…☆29Oct 17, 2021Updated 4 years ago
- 添加识别与检测异步js逻辑☆23Aug 26, 2025Updated 6 months ago
- 网易云音乐MCP智能控制器,提供全局快捷键、搜索单曲播放、搜索歌单播放、自定义歌单管理、每日推荐和私人漫游等丰富功能。☆19Aug 4, 2025Updated 7 months ago