nccgroup / DatajackProxyLinks
Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms
☆102Updated 6 years ago
Alternatives and similar repositories for DatajackProxy
Users that are interested in DatajackProxy are comparing it to the libraries listed below
Sorting:
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- ☆122Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆46Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆94Updated 4 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- ☆73Updated 6 years ago
- A simple tool to convert the IP to a DWORD IP☆140Updated 3 years ago
- A python based library to interact with .net webservices with net.tcp binding. Supports MC-NMF, MC-NMFTB and MS-NNS and contains a proxy …☆57Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆105Updated last year
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- CTF Writeups☆26Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Telco training☆26Updated 6 years ago