skepticfx / tlsjackLinks
A simple TLS forwarder that lets you intercept traffic and play with them.
☆29Updated 6 years ago
Alternatives and similar repositories for tlsjack
Users that are interested in tlsjack are comparing it to the libraries listed below
Sorting:
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Chaosmap is an information gathering tool and dns / whois / web server scanner.☆16Updated 14 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- netgrafio - Visualize your network☆328Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Updated 6 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- ☆14Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Canari local transforms pcap file analysis☆31Updated 11 years ago
- A regular expression for most valid domains (including the latest TLDs)☆40Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Check for HTTP Security Headers☆14Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Service desk password tools.☆16Updated 8 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago