Chan9390 / Awesome-MitMLinks
Curated List of MitM frameworks on GitHub
☆256Updated 7 years ago
Alternatives and similar repositories for Awesome-MitM
Users that are interested in Awesome-MitM are comparing it to the libraries listed below
Sorting:
- Mobile application testing toolkit☆240Updated 6 years ago
- (deprecated) Android application vulnerability analysis and Android pentest tool☆291Updated 6 years ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆266Updated 8 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- Penetration testing and auditing toolkit for Android apps.☆243Updated 6 months ago
- Tool for leaking and bypassing Android malware detection system☆296Updated 8 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Updated 8 years ago
- Mallory - MiTM TCP and UDP Proxy☆321Updated 3 years ago
- We Use Github Extensively and openly. So it becomes dificult to track what's what and what's where. This repository is a master repo to H…☆138Updated 2 years ago
- Captcha Intruder (CIntrud3r) is an automatic pentesting tool to bypass captchas.☆244Updated 5 years ago
- Social Engineering Tool☆190Updated 7 years ago
- Reverse Shell Cheat Sheet TooL☆298Updated 5 years ago
- just for fun ¯\_(ツ)_/¯☆274Updated 9 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆96Updated 6 years ago
- Mass exploitation tool in python☆205Updated 6 years ago
- Auto Root Exploit Tool☆533Updated 2 years ago
- Droidefense: Advance Android Malware Analysis Framework☆480Updated 2 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆331Updated 6 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆216Updated 5 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆118Updated 7 years ago
- Toolkit for implant attack of IoT devices☆136Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- Offensive DNS server☆320Updated 3 years ago
- Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite☆321Updated 8 years ago
- PyMultitor - Python Multi Threaded Tor Proxy☆573Updated 3 weeks ago
- Python framework for IT security tools☆269Updated 8 years ago
- tool to extract passwords from TeamViewer memory using Frida☆465Updated 7 years ago
- 2018 BlackHat Tools List☆385Updated 3 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆658Updated last year