Ettercap Project
☆2,685Feb 1, 2026Updated last month
Alternatives and similar repositories for ettercap
Users that are interested in ettercap are comparing it to the libraries listed below
Sorting:
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,036May 29, 2021Updated 4 years ago
- Metasploit Framework☆37,643Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,883Feb 27, 2026Updated last week
- Framework for Man-In-The-Middle attacks☆3,636Aug 28, 2018Updated 7 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆12,471Feb 25, 2026Updated last week
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Feb 27, 2018Updated 8 years ago
- hydra☆11,686Feb 7, 2026Updated last month
- Nikto web server scanner☆10,134Updated this week
- The Browser Exploitation Framework Project☆10,747Updated this week
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,612Oct 21, 2024Updated last year
- A little tool to play with Windows security☆21,300May 11, 2025Updated 9 months ago
- Scapy: the Python-based interactive packet manipulation program & library.☆12,082Updated this week
- WiFi security auditing tools suite☆6,989Jul 28, 2025Updated 7 months ago
- A swiss army knife for pentesting networks☆9,086Dec 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,900Aug 17, 2020Updated 5 years ago
- World's fastest and most advanced password recovery utility☆25,499Feb 20, 2026Updated 2 weeks ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆12,788Feb 22, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,515Updated this week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,843Nov 10, 2022Updated 3 years ago
- Web application fuzzer☆6,434Jan 21, 2026Updated last month
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,851Feb 22, 2023Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,838Jun 15, 2020Updated 5 years ago
- Automatic SQL injection and database takeover tool☆36,768Feb 26, 2026Updated last week
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,375Jun 5, 2025Updated 9 months ago
- Transparent SSL/TLS interception☆1,858Oct 27, 2025Updated 4 months ago
- Exploitation Framework for Embedded Devices☆13,014Updated this week
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆9,486Feb 16, 2026Updated 2 weeks ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,941Mar 22, 2024Updated last year
- CTF framework and exploit development library☆13,293Updated this week
- UNIX-like reverse engineering framework and command-line toolset☆23,170Feb 27, 2026Updated last week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,206Oct 9, 2023Updated 2 years ago
- The pattern matching swiss knife☆9,459Feb 10, 2026Updated 3 weeks ago
- Github mirror of official Kismet repository☆2,056Feb 27, 2026Updated last week
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Sep 1, 2021Updated 4 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,459Feb 13, 2025Updated last year
- A framework for layer 2 attacks☆829Sep 15, 2023Updated 2 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,729Feb 22, 2026Updated last week