nccgroup / DatajackProxyLinks
Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms
☆102Updated 6 years ago
Alternatives and similar repositories for DatajackProxy
Users that are interested in DatajackProxy are comparing it to the libraries listed below
Sorting:
- Scan for and exploit Consul agents☆40Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- ☆122Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆46Updated 8 years ago
- Jaqen - Simple DNS rebinding☆74Updated 7 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆282Updated 4 months ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆86Updated 4 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- PDML importer for Burp Suite☆28Updated 4 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆123Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 4 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Tool to make in memory man in the middle☆125Updated 6 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- ☆102Updated 6 years ago
- A simple tool to convert the IP to a DWORD IP☆139Updated 3 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 3 months ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆179Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated last year