roglew / puppy
the puppy proxy
☆22Updated 4 years ago
Alternatives and similar repositories for puppy:
Users that are interested in puppy are comparing it to the libraries listed below
- extracts urls from text☆16Updated 6 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Go static analysis tool that checks for security issues using an AST.☆28Updated 6 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆48Updated 2 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Provides access to libhashcat☆30Updated last year
- web based nmap scan collection and search☆19Updated 3 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- ☆16Updated 4 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- ☆36Updated 12 years ago
- The fastest (and least featureful) DNS bruteforcer in the South☆28Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Networking exploration in golang to build a security enhanced version of netcat☆10Updated 7 years ago
- ☆19Updated 7 years ago
- ☆20Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago