python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target
☆350Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for pr0cks-py
Users that are interested in pr0cks-py are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python library using ctypes to search/edit windows / linux / macOS / SunOS programs memory☆782Oct 7, 2022Updated 3 years ago
- port of mimipenguin.sh in python with some additional protection features☆218Apr 30, 2017Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- import pyd or execute PE all from memory using only pure python code and some shellcode tricks☆75Mar 16, 2017Updated 9 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,960Mar 22, 2024Updated 2 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 13 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆793Sep 30, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Feb 24, 2014Updated 12 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆48Oct 10, 2015Updated 10 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- peinjector - MITM PE file infector☆612May 11, 2016Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆298Dec 21, 2017Updated 8 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- powerful auto-backdooring utility☆749Dec 20, 2017Updated 8 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Sniffs sensitive data from interface or pcap☆1,825Nov 2, 2023Updated 2 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆367Dec 14, 2014Updated 11 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago