• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

manipulation

  1. itsMe

    EV: IDS Evasion via TCP/IP Packet Manipulation

    EV is a tool that allows you to craft TCP packets and leverage some well-known TCP/IP packet manipulation techniques to evade IDS devices. It supports HTTP protocol but unfortunately not HTTPS protocol. The handshake process of TLS is quite complicated and I haven’t figured out how to craft TLS...
  2. itsMe

    proxify v0.0.6 - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation

    proxify Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering, and manipulation via DSL language, upstream HTTP/Socks5 proxy. Additionally, a replay utility allows to import the dumped traffic (request/responses with correct domain...
  3. itsMe

    Proxify: Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation

    Proxify Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering, and manipulation via DSL language, upstream HTTP/Socks5 proxy. Additionally, a replay utility allows to import the dumped traffic (request/responses with correct domain...
  4. dEEpEst

    Tools Scapy (Interactive Packet Manipulation Program)

    Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow...
  5. 1

    Exploits V-SOL GPON/EPON OLT Platform 2.03 Link Manipulation

    V-SOL GPON/EPON OLT Platform version 2.03 suffers from a link manipulation vulnerability. View the full article
  6. 1

    Exploits Responsive FileManager 9.13.4 XSS / File Manipulation / Traversal

    Responsive FileManager version 9.13.4 suffers from bypass, cross site scripting, remote file read, remote file write, and traversal vulnerabilities. View the full article
  7. 1

    Exploits FLIR Systems FLIR Thermal Traffic Cameras Websocket Device Manipulation

    FLIR Systems FLIR thermal traffic cameras suffers from a websocket device manipulation vulnerability. View the full article
Back
Top