BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.
☆176Dec 1, 2022Updated 3 years ago
Alternatives and similar repositories for BinProxy
Users that are interested in BinProxy are comparing it to the libraries listed below
Sorting:
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- A Generic Windows Memory Scraping Tool☆70Apr 20, 2017Updated 8 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆327May 4, 2021Updated 4 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- ☆231Nov 18, 2015Updated 10 years ago
- Exploit the credentials present in files and memory☆842May 25, 2023Updated 2 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- This framework is for fuzzing OSX kernel vulnerability based on passive inline hook mechanism in kernel mode.☆229Oct 18, 2017Updated 8 years ago
- A small command-line TCP proxy utility written in Python☆154Jan 4, 2019Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- Nameserver DNS poisoning attacks made easy☆526Feb 26, 2017Updated 9 years ago
- An evolutionary knowledge-based fuzzer☆272May 5, 2024Updated last year
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Python framework for IT security tools☆268Jan 28, 2017Updated 9 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Dec 9, 2021Updated 4 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆345Aug 14, 2022Updated 3 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago