A transparent proxy that can modify and drop traffic for arbitrary TCP connections.
☆276Sep 16, 2019Updated 6 years ago
Alternatives and similar repositories for trudy
Users that are interested in trudy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆205Aug 29, 2016Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Mar 9, 2016Updated 10 years ago
- An implementation of the hashcat rules engine in javascript☆49Feb 17, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- in-memory fuzzing with gdb☆21Feb 10, 2016Updated 10 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- cve-2014-4323 poc☆25Oct 15, 2015Updated 10 years ago
- An intercepting proxy for web application testing☆411Nov 20, 2018Updated 7 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Mallory - MiTM TCP and UDP Proxy☆323Jun 16, 2022Updated 3 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SprayWMI is an easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on …☆250Nov 24, 2015Updated 10 years ago
- Modified dropbear server which acts as a client and allows authless login☆126Aug 27, 2018Updated 7 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Static Php Analysis and Fuzzer☆26Apr 22, 2014Updated 11 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- initial commit☆174Jun 11, 2018Updated 7 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- The Damn Vulnerable Router Firmware Project☆712Apr 7, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆424Aug 29, 2017Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- Auto Domain Admin and Network Exploitation.☆298Dec 21, 2017Updated 8 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 13 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Cartero - Social Engineering Framework☆176Mar 8, 2026Updated last month
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- Password cracking rules for Hashcat based on statistics and industry patterns☆1,528Jul 15, 2019Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,390Jun 17, 2022Updated 3 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 10 years ago