skepticfx / tlsjackLinks
A simple TLS forwarder that lets you intercept traffic and play with them.
☆29Updated 6 years ago
Alternatives and similar repositories for tlsjack
Users that are interested in tlsjack are comparing it to the libraries listed below
Sorting:
- Fuzzing web services in style with nodejs☆10Updated 6 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Updated 10 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 9 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- Tutorial for Node.js security☆21Updated 5 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Chaosmap is an information gathering tool and dns / whois / web server scanner.☆16Updated 14 years ago
- Service desk password tools.☆16Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- netgrafio - Visualize your network☆328Updated 10 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Asynchronous scanning library☆21Updated 10 years ago
- Check for HTTP Security Headers☆14Updated 10 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 12 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- ☆14Updated 10 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Updated 12 years ago