LeonardoNve / dns2proxy
Offensive DNS server
☆317Updated 3 years ago
Alternatives and similar repositories for dns2proxy:
Users that are interested in dns2proxy are comparing it to the libraries listed below
- SSLStrip version to defeat HSTS☆318Updated 7 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆180Updated 6 years ago
- Offensive DNS server☆64Updated 7 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- Metasploit AV Evasion Tool☆260Updated 9 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆284Updated 8 years ago
- NTP Main-in-the-Middle tool☆245Updated 3 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- ☆282Updated 10 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated last year
- BlackNurse attack PoC☆173Updated 8 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- WIreless Hacking Tools☆162Updated 11 years ago
- Mass exploitation tool in python☆205Updated 6 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆342Updated 8 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆227Updated 7 years ago
- Python network tool, similar to Netcat with custom features.☆194Updated 7 years ago
- Modified hostapd to facilitate AP impersonation attacks☆506Updated 6 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆267Updated 11 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- ☆193Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆500Updated 5 years ago
- ☆224Updated 10 months ago