mitmproxy / mitmwebLinks
GSoC Issue tracking for mitmweb.
☆12Updated 9 years ago
Alternatives and similar repositories for mitmweb
Users that are interested in mitmweb are comparing it to the libraries listed below
Sorting:
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 9 years ago
- ☆101Updated 4 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 6 years ago
- Deliberately vulnerable web application☆22Updated 8 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 10 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 9 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆26Updated 9 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35Updated 10 years ago
- ☆23Updated 12 years ago
- public bugs/proof of concepts☆50Updated 4 years ago
- Taggant System developed by the Malware Working Group of ICSG (Industry Connections Security Group) under the umbrella of IEEE☆34Updated 8 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 9 years ago
- Pre-OS microcode updater☆43Updated 7 years ago
- ☆10Updated 9 years ago
- Usefull snippets / Computer-security oriented☆20Updated 8 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 5 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- CANAPE Network Testing Tool☆33Updated 7 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Updated 10 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Updated 7 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- A collection of code snippets used in blog posts.☆54Updated 5 months ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Updated 9 years ago