nccgroup / DatajackProxyLinks
Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms
☆102Updated 5 years ago
Alternatives and similar repositories for DatajackProxy
Users that are interested in DatajackProxy are comparing it to the libraries listed below
Sorting:
- Scan for and exploit Consul agents☆40Updated 6 years ago
- ☆122Updated 7 years ago
- Jaqen - Simple DNS rebinding☆73Updated 7 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 months ago
- A simple tool to convert the IP to a DWORD IP☆139Updated 3 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Frida script to bypass ssl Pinning☆45Updated 3 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- Tool to make in memory man in the middle☆125Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- ☆74Updated 6 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- CTF Writeups☆26Updated 5 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆178Updated 2 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- ☆52Updated 6 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 9 months ago
- Highlight Burp proxy requests made by different browsers☆29Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago