muzuiget / mitmpcapLinks
export mitmproxy traffic to PCAP file
☆56Updated 2 years ago
Alternatives and similar repositories for mitmpcap
Users that are interested in mitmpcap are comparing it to the libraries listed below
Sorting:
- ☆72Updated 7 years ago
- Repository containing many useful scripts☆75Updated 3 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆110Updated 10 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- RDP honeypot☆68Updated 6 years ago
- Community-based integrated malware identification system☆81Updated 3 years ago
- Set of scripts to deal with Cisco ASA firmware [pack/unpack etc.]☆104Updated 3 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated last week
- The Alternative Fileless File System☆57Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 7 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 5 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- A CLI tool for querying passive DNS services☆42Updated 2 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 6 years ago
- ☆73Updated last year
- Exploitation challenges for CTF☆63Updated 7 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆55Updated 7 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- List of real-world threats against endpoint protection software☆216Updated last month
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- HP printer security research code☆55Updated 8 years ago