ondrakrat / js-mitm-proxy
Example of JS injection using Man-in-the-middle proxy
☆25Updated 3 years ago
Alternatives and similar repositories for js-mitm-proxy:
Users that are interested in js-mitm-proxy are comparing it to the libraries listed below
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Modular rootkit framework.☆27Updated 4 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Updated 4 years ago
- Golang ransomware☆45Updated 4 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 5 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- python hash cracker☆52Updated 4 months ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- ☆20Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- Provides access to libhashcat☆30Updated 11 months ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Encryption Abstraction Layer and Utilities for ratnet☆18Updated 10 months ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago