LeonardoNve / dns2proxyLinks
Offensive DNS server
☆323Updated 3 years ago
Alternatives and similar repositories for dns2proxy
Users that are interested in dns2proxy are comparing it to the libraries listed below
Sorting:
- SSLStrip version to defeat HSTS☆321Updated 8 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆182Updated 7 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆198Updated 6 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- Offensive DNS server☆67Updated 7 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆256Updated 7 years ago
- This repository contains some bettercap transparent proxy example modules.☆281Updated 7 years ago
- DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response☆287Updated 8 years ago
- Modified hostapd to facilitate AP impersonation attacks☆516Updated 7 years ago
- just for fun ¯\_(ツ)_/¯☆272Updated 9 years ago
- ☆284Updated 11 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆148Updated 10 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- BlackNurse attack PoC☆176Updated 9 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆139Updated 9 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Updated 6 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆222Updated 8 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆348Updated 2 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆228Updated 7 years ago
- Akamai Reflective DDoS Tool - Attack the origin host behind the Akamai Edge hosts and DDoS protection offered by Akamai services.☆263Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆268Updated 11 years ago
- Specify targets and run sets of tools against them☆384Updated 6 years ago
- A Simple Multi-Threaded SSH Brute Forcer☆277Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆360Updated 2 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Updated 8 years ago
- metasploitHelper☆251Updated 5 years ago