Chan9390 / Awesome-MitM
Curated List of MitM frameworks on GitHub
☆249Updated 7 years ago
Alternatives and similar repositories for Awesome-MitM:
Users that are interested in Awesome-MitM are comparing it to the libraries listed below
- Mobile application testing toolkit☆237Updated 6 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆292Updated 4 years ago
- Social Engineering Tool☆189Updated 6 years ago
- Penetration testing and auditing toolkit for Android apps.☆235Updated 4 years ago
- 2018 BlackHat Tools List☆382Updated 2 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆323Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆118Updated 6 years ago
- for mass exploiting☆598Updated 2 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆288Updated 6 years ago
- It is a hack tool kit for pentest and web security research.☆510Updated 4 years ago
- Perform advanced MiTM attacks on websites with ease 💉☆666Updated 10 months ago
- Mass exploitation tool in python☆203Updated 6 years ago
- Burp Plugin to decrypt AES encrypted traffic on the fly☆636Updated 2 years ago
- Auto Root Exploit Tool☆531Updated last year
- XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of…☆139Updated 5 years ago
- tool to extract passwords from TeamViewer memory using Frida☆462Updated 6 years ago
- Phishing on Twitter☆252Updated 6 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆268Updated 5 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆404Updated 5 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆274Updated 2 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆219Updated last year
- A fully featured Windows backdoor that uses Gmail as a C&C server☆494Updated 5 years ago
- A python tool to identify different Hash Function Algorithms☆405Updated 4 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆252Updated last year
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆169Updated 5 years ago
- Files for appsecwiki.com☆116Updated 4 years ago
- This code is vulnerable to SQL Injection and having SQLite database. For SQLite database, SQL Injection payloads are different so it is f…☆160Updated 3 years ago