ondrakrat / js-mitm-proxyLinks
Example of JS injection using Man-in-the-middle proxy
☆25Updated 4 years ago
Alternatives and similar repositories for js-mitm-proxy
Users that are interested in js-mitm-proxy are comparing it to the libraries listed below
Sorting:
- Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)☆19Updated 5 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 6 years ago
- Carbanak leaked source☆73Updated 7 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 4 years ago
- HTTP botnet☆62Updated 9 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70Updated 6 years ago
- Proxy scraper for proxychains☆46Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- Passwords Recovery Tool☆225Updated 4 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 4 years ago
- Light C++ Logger Library☆19Updated 7 years ago
- ☆65Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- RAT Museum☆106Updated 2 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆133Updated 4 years ago
- Quick script written for sorting and categorizing Shodan API keys acquired via scraping the internet.☆57Updated last year
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- ☆106Updated 4 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 3 years ago
- Dump browser passwords(chrome, firefox) with sqlite3 lib.☆88Updated 9 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Updated last year
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 5 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Updated 7 years ago