nccgroup / DatajackProxy
Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms
☆102Updated 5 years ago
Alternatives and similar repositories for DatajackProxy:
Users that are interested in DatajackProxy are comparing it to the libraries listed below
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- ☆122Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 10 months ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year
- TLS Redirection☆120Updated 7 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆273Updated 3 weeks ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Updated 2 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Pypykatz server☆125Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 5 years ago
- ☆97Updated 3 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Python tool that generates an Xmind map with all the information gathered and any evidence of possible vulnerabilities identified via sta…☆122Updated 6 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- DupeKeyInjector☆135Updated 3 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Simple tool to automate adding shellcode to PE files☆49Updated 7 years ago
- Winstrument is a framework of modular scripts to aid in instrumenting Windows software using Frida for reverse engineering and attack sur…☆68Updated 4 years ago
- Improved decoder for Burp Suite☆138Updated 3 years ago