FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part of FruityWifi project. It provides a RESTful API.
☆14Jan 6, 2019Updated 7 years ago
Alternatives and similar repositories for FruityProxy
Users that are interested in FruityProxy are comparing it to the libraries listed below
Sorting:
- Fake Seeder for Torrent☆13May 3, 2020Updated 5 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Feb 1, 2026Updated last month
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- A PowerShell script that automatically backups all remote GitHub repositories to a local directory.☆24Dec 29, 2025Updated 2 months ago
- An experimental rootkit for Android☆26Feb 22, 2013Updated 13 years ago
- Sauce for HideyHole☆20Aug 28, 2023Updated 2 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- PowerShell Runspace Connect-Back Shell☆26Dec 31, 2015Updated 10 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- Changing Windows one build at a time☆23Mar 2, 2019Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆35Jun 4, 2018Updated 7 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- GSM Sniffer☆39Oct 16, 2011Updated 14 years ago
- ☆27May 29, 2015Updated 10 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- app lock android project☆16May 31, 2013Updated 12 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- A platform to study browser fingerprinting☆73Feb 2, 2023Updated 3 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- ☆37Feb 26, 2026Updated last week
- The web gui for the OpenBSD pf firewall☆16Feb 9, 2010Updated 16 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- This project is no longer maintained here, instead please see 'Untamed Now Playing Next', maintained by Wykks☆26May 9, 2014Updated 11 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆173Jun 15, 2019Updated 6 years ago