Tekton library for EDP pipelines. EDP Interceptor that enriches payload from VCS with EDP entities
-
Updated
May 24, 2024 - Python
Tekton library for EDP pipelines. EDP Interceptor that enriches payload from VCS with EDP entities
Sniff, spoof, intercept and manipulate network traffic using ARP poisoning to act as an intermediary; for auditing purposes.
Middleware for Python Django
This tool will allow you to modify network traffic as a Man-in-the-middle.
The goal of this thesis is to calculate the required filter bandwidths of the Comet Camera (CoCa) on the Comet Interceptor mission. Reflectance of the Comet as well as the exposure time need to be taken into account.
An automated tool that is able to deauthorize a legitimate controller that's controlling a E58Pro drone, then allow control to be passed to an Xbox 360 controller to assume control.
Proof-of-concept keyboard keystroke interceptor for PS/2 protocol proposed to be used with USB-to-ps/2 downgrade
👀 Intercept requests passively of DHCP from own network! 👀
Python tools for ethical hacking
Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease application security people work and allow them perform an automatic authorization tests
Add a description, image, and links to the interceptor topic page so that developers can more easily learn about it.
To associate your repository with the interceptor topic, visit your repo's landing page and select "manage topics."