xtr4nge / FruityProxy
FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part of FruityWifi project. It provides a RESTful API.
☆15Updated 6 years ago
Alternatives and similar repositories for FruityProxy:
Users that are interested in FruityProxy are comparing it to the libraries listed below
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- WAF Exploitation Framework☆13Updated last year
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- ☆15Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago