ondrakrat / js-mitm-proxy
Example of JS injection using Man-in-the-middle proxy
☆25Updated 3 years ago
Alternatives and similar repositories for js-mitm-proxy:
Users that are interested in js-mitm-proxy are comparing it to the libraries listed below
- Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)☆19Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆55Updated 3 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- DNS Botnet Server and Client☆34Updated 5 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 5 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated last year
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- PoC of injecting code into a running Linux process☆23Updated 5 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- HTTP botnet☆59Updated 8 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 8 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆17Updated 8 years ago
- python hash cracker☆52Updated 3 months ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆47Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Golang ransomware☆44Updated 4 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆98Updated 7 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆34Updated 3 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆10Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago