ondrakrat / js-mitm-proxyLinks
Example of JS injection using Man-in-the-middle proxy
☆25Updated 3 years ago
Alternatives and similar repositories for js-mitm-proxy
Users that are interested in js-mitm-proxy are comparing it to the libraries listed below
Sorting:
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)☆19Updated 4 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 3 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆40Updated 8 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Modular rootkit framework.☆29Updated 4 years ago
- Light C++ Logger Library☆19Updated 7 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- Docker image for PowerShell remoting from Linux to Windows☆36Updated 6 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- Rootless keylogger for X☆34Updated 5 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 6 years ago
- Provides access to libhashcat☆30Updated last year
- Summary and archives of leaked Vietnam TLD DNS data☆42Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Automated 802.1x Bypass☆84Updated 5 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆20Updated 5 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆133Updated 4 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago