n1nj4sec / pr0cks-py
python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target
☆349Updated 2 years ago
Alternatives and similar repositories for pr0cks-py:
Users that are interested in pr0cks-py are comparing it to the libraries listed below
- Offensive DNS server☆315Updated 2 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆373Updated 3 years ago
- A small and sweet man-in-the-middle proxy capable of doing HTTP and HTTP over SSL.☆220Updated last year
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆995Updated 3 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- Mallory - MiTM TCP and UDP Proxy☆314Updated 2 years ago
- ☆135Updated 9 years ago
- Protect your Wireless Network from Evil Access Points!☆181Updated last year
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- SSLStrip version to defeat HSTS☆315Updated 7 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆460Updated 6 months ago
- Probably one of the smallest SSL MITM proxies you can make☆181Updated 9 years ago
- A framework for Backdoor development!☆437Updated 6 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Specify targets and run sets of tools against them☆385Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆488Updated 3 years ago
- A webshell framework for penetration testers.☆296Updated 9 months ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- powerful auto-backdooring utility☆743Updated 7 years ago
- BlackNurse attack PoC☆170Updated 8 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 8 years ago