LeonardoNve / dns2proxyLinks
Offensive DNS server
☆319Updated 3 years ago
Alternatives and similar repositories for dns2proxy
Users that are interested in dns2proxy are comparing it to the libraries listed below
Sorting:
- A mirror of the original SSLstrip+ code by Leonardo Nve☆181Updated 7 years ago
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆137Updated 9 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆193Updated 6 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- Offensive DNS server☆66Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 9 months ago
- WPSploit - Exploiting Wordpress With Metasploit☆226Updated 7 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆282Updated 8 years ago
- Framework for Man-In-The-Middle attacks☆187Updated 8 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆218Updated 8 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆268Updated 11 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 8 years ago
- ☆194Updated 6 years ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 5 years ago
- Modified hostapd to facilitate AP impersonation attacks☆516Updated 7 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- ☆284Updated 10 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 2 years ago
- Detect and prevent KRACK attacks in your network☆182Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆197Updated 8 years ago
- [unmaintained] Post-exploitation tool☆183Updated 9 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Updated 8 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago