robert / how-to-build-a-tcp-proxy
How to build a TCP proxy, step by step
☆69Updated 4 years ago
Alternatives and similar repositories for how-to-build-a-tcp-proxy:
Users that are interested in how-to-build-a-tcp-proxy are comparing it to the libraries listed below
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 10 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆67Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- File transfer via DNS☆71Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- simple shellcode generator☆112Updated 7 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆101Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Binary reversing tool to find all possible code paths between two functions.☆27Updated 6 years ago
- ☆17Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- Modern Binary Exploitation write-ups.☆4Updated 5 years ago
- ☆44Updated 7 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆13Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- ☆51Updated 8 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 2 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- GitHub Mirror of Hash-Identifier☆33Updated 13 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 7 years ago
- A simple tool to manipulate window objects in Windows☆44Updated 8 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- ☆52Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago