phackt / mitmLinks
Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)
☆19Updated 5 years ago
Alternatives and similar repositories for mitm
Users that are interested in mitm are comparing it to the libraries listed below
Sorting:
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Updated 8 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Random stuff☆16Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 9 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated 2 years ago
- PowerShell Reverse HTTPs Shell☆29Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- pentest toolbox☆27Updated 3 years ago
- ☆25Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Several self-defense shellcodes☆23Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 7 years ago
- One-off scripts☆52Updated 8 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago