Mallet is an intercepting proxy for arbitrary protocols
☆290Apr 14, 2025Updated 11 months ago
Alternatives and similar repositories for mallet
Users that are interested in mallet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆424Mar 13, 2026Updated 3 weeks ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Java API for SSL\TLS scanning and reporting☆149Apr 2, 2026Updated last week
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆211Nov 16, 2018Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 8 months ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 8 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- PowerShell oneliner to retrieve wdigest passwords from the memory☆220Dec 11, 2017Updated 8 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 6 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- ☆137Mar 20, 2019Updated 7 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 4 months ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- A tool to abuse Exchange services☆2,303Jun 10, 2024Updated last year
- Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams wr…☆448Oct 28, 2022Updated 3 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Open Source Threat Intelligence Chat Bot☆321Mar 30, 2020Updated 6 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- gather gather gather☆584Mar 15, 2025Updated last year
- A fully functional DanderSpritz lab in 2 commands☆450May 16, 2019Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆15Feb 19, 2018Updated 8 years ago