praetorian-inc / trudyLinks
A transparent proxy that can modify and drop traffic for arbitrary TCP connections.
☆276Updated 6 years ago
Alternatives and similar repositories for trudy
Users that are interested in trudy are comparing it to the libraries listed below
Sorting:
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆201Updated 9 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆222Updated 8 years ago
- Self contained cross platform DNS recon tool☆187Updated 8 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Updated 3 years ago
- Mallory - MiTM TCP and UDP Proxy☆322Updated 3 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆191Updated 6 years ago
- blacksheepwall is a hostname reconnaissance tool☆302Updated 5 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆162Updated 2 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- ☆66Updated 10 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆348Updated 2 years ago
- ☆128Updated 10 years ago
- Little bit of this, little bit of that☆90Updated 2 months ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆178Updated 2 years ago
- Go library and command line to seek for secrets on various sources.☆242Updated 5 years ago
- Recon, Subdomain Bruting, Zone Transfers☆231Updated 9 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆153Updated 6 years ago
- Queue and resource system for cracking passwords☆389Updated 3 years ago
- DNS Reverse Proxy☆190Updated 2 months ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- Message Queue & Broker Injection tool☆150Updated 2 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated 2 years ago
- a grep -r for secrets☆178Updated 3 years ago