nccgroup / DatajackProxy
Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms
☆102Updated 5 years ago
Alternatives and similar repositories for DatajackProxy:
Users that are interested in DatajackProxy are comparing it to the libraries listed below
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- ☆72Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆94Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆132Updated 6 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Updated 2 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆122Updated 7 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆127Updated last year
- Patches those pesky APKs for proxy use.☆49Updated 4 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 5 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into unmanaged processes☆116Updated 5 years ago
- VerSprite Security Research☆165Updated 2 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆270Updated 4 months ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Pypykatz server☆125Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- Some scripts and exploits☆146Updated 6 years ago
- .NET Deserialization Passive Scanner☆45Updated 7 years ago