praetorian-inc / trudyLinks
A transparent proxy that can modify and drop traffic for arbitrary TCP connections.
☆276Updated 5 years ago
Alternatives and similar repositories for trudy
Users that are interested in trudy are comparing it to the libraries listed below
Sorting:
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆200Updated 9 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆219Updated 8 years ago
- Self contained cross platform DNS recon tool☆187Updated 8 years ago
- Mallory - MiTM TCP and UDP Proxy☆321Updated 3 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 10 years ago
- Little bit of this, little bit of that☆90Updated 2 weeks ago
- ☆128Updated 10 years ago
- proxy poc implementation of STARTTLS stripping attacks☆168Updated 3 years ago
- ☆66Updated 9 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆151Updated 6 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆179Updated 2 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- blacksheepwall is a hostname reconnaissance tool☆304Updated 5 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆190Updated 6 years ago
- Wolves Among the Sheep☆147Updated last year
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Queue and resource system for cracking passwords☆388Updated 2 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 9 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- Go library and command line to seek for secrets on various sources.☆243Updated 5 years ago
- elf-strings will programmatically read an ELF binary's string sections within a given binary. This is meant to be much like the strings U…☆140Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- A Go library containing a set of opinionated packages, objects, helpers and functions implemented with the KISS principle in mind.☆163Updated 2 years ago
- HTTP/2 fuzzer written in Golang☆178Updated 9 years ago
- Internet data acquisition☆149Updated 4 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Message Queue & Broker Injection tool☆150Updated 2 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- SSH Tunnelling in "RAW mode", via STDIN/OUT without using forwarding channels☆110Updated 6 years ago