mricon / rev-proxy-grapherView external linksLinks
Reverse proxy grapher
☆399Jul 28, 2024Updated last year
Alternatives and similar repositories for rev-proxy-grapher
Users that are interested in rev-proxy-grapher are comparing it to the libraries listed below
Sorting:
- Web of trust grapher☆39Jun 13, 2025Updated 8 months ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Mini CA☆12Sep 7, 2015Updated 10 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 5 years ago
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- Python package for generating Linux iptables configurations.☆10Jul 1, 2021Updated 4 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)☆2,988Jun 28, 2024Updated last year
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 14 years ago
- a friendly http interface to the aws api☆23May 14, 2018Updated 7 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Seamlessly spy on SSH session like it is your tty☆349Sep 30, 2017Updated 8 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.☆340Jan 23, 2023Updated 3 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Dec 13, 2017Updated 8 years ago
- DEPRECATED☆12Jul 21, 2017Updated 8 years ago
- A tool for validating data using JSON Schema and converting JSON Schema documents into different data-interchange formats☆148Oct 9, 2020Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- Nginx configuration static analyzer☆8,551Jul 28, 2024Updated last year
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆525Oct 24, 2017Updated 8 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Feb 9, 2024Updated 2 years ago
- pastamaker is a Github App to automatically manage Pull Requests "branch update" and "merge"☆30Apr 14, 2018Updated 7 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- Validator for HTTP☆933Jun 27, 2019Updated 6 years ago