NCnew / BadProxy
BadProxy is the tool which show a man in middle attack over the internet over the proxy
β10Updated 7 years ago
Alternatives and similar repositories for BadProxy:
Users that are interested in BadProxy are comparing it to the libraries listed below
- π‘ A security research tool with shodan integrationβ25Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.β67Updated 6 years ago
- Metasploit installer for Debian (Jessie) VPS.β25Updated 8 years ago
- Search google for shellshock vulnerable sitesβ27Updated 10 years ago
- (Unofficial) Python API for cybercrime-tracker.netβ37Updated 7 years ago
- WPS scan and pwn toolβ67Updated 5 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.β20Updated 7 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.β17Updated 7 years ago
- Express security essentials deployment for Linux Serversβ58Updated 4 years ago
- Automatically get internetz from access points that have MAC based filtering enabledβ55Updated 7 years ago
- Terminal Ip Lookup Toolβ56Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.β22Updated 8 years ago
- Proof of Concept for CVE-2018-11776β21Updated 6 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)β49Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploitβ84Updated 6 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&Cβ27Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploitsβ11Updated 5 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part oβ¦β15Updated 6 years ago
- Shodan.io Command Line Interfaceβ44Updated 3 years ago
- A simple tool to dump users in popular forums and CMS :)β29Updated 7 years ago
- Windows Offline Common Password Hash Checkerβ29Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network vβ¦β39Updated 9 years ago
- Wardriving ekopartyβ15Updated 7 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewallβ32Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.β24Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.β40Updated 8 years ago
- A collection of nmap scripts I've writtenβ23Updated 9 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcerβ53Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the stβ¦β27Updated 11 years ago
- Enumerate subdomains through Virustotalβ32Updated 5 years ago