NCnew / BadProxy
BadProxy is the tool which show a man in middle attack over the internet over the proxy
☆10Updated 7 years ago
Alternatives and similar repositories for BadProxy:
Users that are interested in BadProxy are comparing it to the libraries listed below
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 6 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Removed according to regulations☆35Updated 7 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 10 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Phishing webapp generator☆41Updated 6 years ago
- CTF Writeups☆18Updated 7 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- Basic examples for MITMf☆16Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 7 years ago
- A simple tool to dump users in popular forums and CMS :)☆29Updated 7 years ago