twisted-pear / mcfdLinks
A proxy for encrypting TCP connections.
☆11Updated 8 years ago
Alternatives and similar repositories for mcfd
Users that are interested in mcfd are comparing it to the libraries listed below
Sorting:
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- googleusercontent.com as HTTP(S) proxy☆54Updated 4 years ago
- RESTful interface to your operating system shell☆19Updated 7 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A collection of steganography tools.☆15Updated 4 years ago
- Some NSE scripts to search information from routers☆36Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- ☆12Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Thread Injection Kit. A notorious little attempt to create Windows CreateRemoteThread() equivalent on unix (*nix) platform.☆48Updated 13 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 9 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 11 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- PPPoAT - PPP over Any Transport☆22Updated 4 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- ☆17Updated 10 years ago