ondrakrat / js-mitm-proxy
Example of JS injection using Man-in-the-middle proxy
☆24Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for js-mitm-proxy
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 5 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆130Updated 11 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- Docker kinsing malware bitcoin/xmr miner☆22Updated 3 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- ☆12Updated 7 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- (Unofficial) Python API for http://netcraft.com☆15Updated 8 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆32Updated 2 weeks ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 7 years ago
- ☆64Updated 8 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆86Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 10 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago
- A simple SOCKS5 server written in Go☆27Updated 8 years ago
- python hash cracker☆52Updated this week
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Proxy scraper for proxychains☆46Updated 4 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆71Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 6 years ago