0x0be / mitmLinks
A simple yet effective python3 script to perform DNS spoofing via ARP poisoning
☆41Updated 4 years ago
Alternatives and similar repositories for mitm
Users that are interested in mitm are comparing it to the libraries listed below
Sorting:
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 6 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆75Updated 5 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆35Updated 4 years ago
- Web App Pen Tester (Web Interface)☆32Updated 2 years ago
- Repository of tools used in my blog☆52Updated last year
- pen testing scripts☆12Updated 4 years ago
- Simple Backdoor Manager with Python (based on weevely)☆95Updated 6 months ago
- Keylogger using pynput + mail sender☆54Updated 5 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Updated 4 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Updated 7 years ago
- It is a tool that brings together exploits and news about security and vulnerabilities, with the intention of contributing to the open so…☆64Updated 6 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆33Updated 4 years ago
- A tool to harvest credentials from leaked data dump☆75Updated 3 years ago
- HTTP botnet☆62Updated 9 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 9 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Godzilla is an automated scanner tool for bug hunters/pentesters that can scan website for vulnerabilities, Do Information gathering in N…☆30Updated 6 years ago
- Damn Small SQLi Scanner. (DSSS)☆16Updated 7 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆38Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- Script to facilitate different functions and checks☆47Updated 3 years ago
- All Zero Day Exploits☆20Updated 7 years ago
- Simple Karma Attack☆69Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆41Updated 4 years ago