Decrypt HTTPS/TLS connections on the fly with Wireshark
☆452Oct 13, 2024Updated last year
Alternatives and similar repositories for extract-tls-secrets
Users that are interested in extract-tls-secrets are comparing it to the libraries listed below
Sorting:
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- CVE-2020-36184 && Jackson-databind RCE☆15Jan 11, 2021Updated 5 years ago
- Adds a guard to disable ObjectInputStream.readObject☆11Dec 6, 2015Updated 10 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Automatic DNS Enumeration Tool with various functions☆13Sep 28, 2021Updated 4 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Kernel file/process/object tool☆69Aug 4, 2021Updated 4 years ago
- DuckDB extension for readin PCAP files☆19Aug 31, 2024Updated last year
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Frida tool to dump an NSS Key Log for Wireshark, from a process using dynamically linked OpenSSL (or BoringSSL)☆118Jul 22, 2018Updated 7 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Sep 21, 2017Updated 8 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- Fake Protocol Server☆1,610Jan 2, 2025Updated last year
- Weblogic Unrestricted File Upload☆54Apr 17, 2019Updated 6 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆41Jul 29, 2025Updated 7 months ago
- ☆121Jun 17, 2022Updated 3 years ago
- NT AUTHORITY\SYSTEM☆43Jul 8, 2020Updated 5 years ago
- Knowledge Base 慢雾安全团队知识库☆29Oct 22, 2019Updated 6 years ago
- Java code comparison tool (jar / class)☆341Jun 4, 2020Updated 5 years ago
- A static byte code analyzer for Java deserialization gadget research☆252Apr 17, 2017Updated 8 years ago
- log4j-patch 修改字节码实现补丁防御☆20Dec 10, 2021Updated 4 years ago
- Demonstration of a pure Java Certificate Authority and HTTPS client and servers☆12Jan 26, 2026Updated last month
- CVE-2019-16097 PoC☆23Sep 19, 2019Updated 6 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Jul 30, 2020Updated 5 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆119Aug 4, 2018Updated 7 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Oct 14, 2020Updated 5 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,167May 26, 2023Updated 2 years ago
- JMX enumeration and attacking tool.☆493Jun 26, 2025Updated 8 months ago