xtr4nge / FruityProxy
FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part of FruityWifi project. It provides a RESTful API.
☆15Updated 5 years ago
Related projects: ⓘ
- ☆35Updated this week
- Clone of Metasploit's wiki w/ additions☆15Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- ☆19Updated this week
- w3af packaging for Kali distribution☆24Updated 8 years ago
- Educational Python penetration testing framework☆10Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆25Updated 4 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- ☆17Updated this week
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Public Advisories for Security Vulnerabilities.☆26Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 8 years ago
- ☆21Updated this week
- ☆17Updated this week
- collection of useful shells for penetration tests☆36Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 8 years ago
- ☆12Updated this week
- ssh session type for metasploit☆97Updated last year
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆79Updated 11 years ago