Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)
☆19Jun 19, 2020Updated 5 years ago
Alternatives and similar repositories for mitm
Users that are interested in mitm are comparing it to the libraries listed below
Sorting:
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- ☆25Apr 30, 2012Updated 13 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆58Mar 13, 2020Updated 5 years ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- Remote shell victim machines☆23Sep 13, 2019Updated 6 years ago
- ☆24Feb 2, 2026Updated last month
- ☆10Sep 11, 2021Updated 4 years ago
- IOCs for CRASHOVERRIDE malware framework☆27Jun 15, 2017Updated 8 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Updated this week
- idenLib (Library Function Identification) plugin for x32dbg☆41Feb 26, 2019Updated 7 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- You can use it to modify HTTP (S) response values, redirect static file requests to the local file directory, and support batch modificat…☆18Nov 30, 2022Updated 3 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- ☆14Feb 18, 2026Updated last week
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- A generator for malicious DLL files for DLL Hijacking attacks☆33Dec 6, 2019Updated 6 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- a fast c-style struct packer & unpacker for golang☆36Jun 16, 2022Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Apr 22, 2019Updated 6 years ago
- Rapid Response sample Foundry app