twisted-pear / mcfd
A proxy for encrypting TCP connections.
☆11Updated 8 years ago
Alternatives and similar repositories for mcfd:
Users that are interested in mcfd are comparing it to the libraries listed below
- Kerby - Light weight video surveillance system.☆9Updated 15 years ago
- Simulate data upload to boost your ratio on BitTorrent trackers☆13Updated 8 years ago
- googleusercontent.com as HTTP(S) proxy☆54Updated 4 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Access .onion sites without Tor Browser☆31Updated 7 years ago
- Transparent proxying for I2P and forwarding other addresses to Tor or clearnet.☆34Updated last year
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Automatic detection of hashing algorithms☆21Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- simple scripts to parse and patch Microsoft fitness band firmware update file☆12Updated last year
- Bash integer overflow in braces☆11Updated 9 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 8 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Updated 9 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 10 years ago
- ☆12Updated 8 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- A library for efficient interception of established TCP connections☆19Updated 9 years ago