skepticfx / tlsjackLinks
A simple TLS forwarder that lets you intercept traffic and play with them.
☆29Updated 6 years ago
Alternatives and similar repositories for tlsjack
Users that are interested in tlsjack are comparing it to the libraries listed below
Sorting:
- Fuzzing web services in style with nodejs☆10Updated 6 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- Chaosmap is an information gathering tool and dns / whois / web server scanner.☆16Updated 14 years ago
- Tutorial for Node.js security☆21Updated 5 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Asynchronous scanning library☆21Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Check for HTTP Security Headers☆14Updated 10 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Service desk password tools.☆16Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- A fuzzing library that allows creating malicious payloads based on Joi validator schemas.☆14Updated 10 years ago
- ☆14Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- netgrafio - Visualize your network☆328Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- [DEPRECATED] Static analysis tool for javascript code.☆427Updated 4 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 10 years ago
- Extracting server private key using Heartbleed OpenSSL vulnerability.☆394Updated 10 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 12 years ago