Beagle(bone) in the Middle
☆25Oct 9, 2020Updated 5 years ago
Alternatives and similar repositories for BitM
Users that are interested in BitM are comparing it to the libraries listed below
Sorting:
- ☆12Aug 29, 2025Updated 5 months ago
- ☆18Sep 14, 2023Updated 2 years ago
- Use burp's JS static code analysis on code from your local system.☆43Dec 22, 2016Updated 9 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated 9 months ago
- An opensource project similar to HoneyDocs☆26Oct 10, 2015Updated 10 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- ☆73Apr 18, 2013Updated 12 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- ☆13Aug 5, 2025Updated 6 months ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- 'Software Asset Management' PowerShell library to extract software licensing relevant information from enterprise software systems☆13Aug 26, 2020Updated 5 years ago
- Integrity validator for iOS devices☆100Feb 28, 2019Updated 6 years ago
- An XSS smoke test for ReactJS☆38Dec 2, 2022Updated 3 years ago
- C# SDK for SecureAuth IdP API☆11May 31, 2023Updated 2 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- Ambush Host Intrusion Prevention System☆65Sep 8, 2013Updated 12 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Recreated gerbers for the Supermicro X11SSH-F motherboard.☆16Aug 2, 2023Updated 2 years ago
- Windows DPAPI laboratory☆95Mar 5, 2018Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- A lightweight PDF library optimized for metadata extraction and insertion☆14Jun 2, 2017Updated 8 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- ☆10May 30, 2015Updated 10 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Convert OpenVPN profiles to an APC file that can be imported into a Sophos/Astaro UTM☆14Nov 16, 2015Updated 10 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Sample code for Python networking and threading☆11Oct 27, 2014Updated 11 years ago