
mitmproxy – Resource Override: A script for the proxy mitmproxy to help you gain full control of any website (through any browser) by redirecting traffic…

HoneyBadger is a comprehensive TCP stream analysis tool for detecting and recording TCP attacks. HoneyBadger includes a variety of TCP stream injections attacks which will…

Poddle Attack is A sample application of the Poddle (Padding Oracle On Downgraded Legacy Encryption) attack with a Man on the Middle exploit to demonstrate…

Changeslog: + Fix: accept remote connection from netcat + Dispatch des outputs dans les bon logs selon client ou serveur + Fix: accept remote connection…

Changelog v-28.01.2015: + Controller : Time to get back to work – starting with some simple comment fixes. + Templates : routing.go and html login…

Change 26-01-2015: – Adding PEBytes parameter; function Invoke-ReflectivePEInjection. PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid reverse engineers, forensic…

Definitions: + backdoor: A backdoor is deliberate functionality that bypasses official publicly-documented authorization methods for that software and is intended by the author to be…

This tool encompasses two distinct features. It guesses the IOCTL values that the driver accepts and also their valid size limitations and store the results…