aapooksman / certmitm
A tool for testing for certificate validation vulnerabilities of TLS connections made by a client device or an application.
☆655Updated this week
Alternatives and similar repositories for certmitm
Users that are interested in certmitm are comparing it to the libraries listed below
Sorting:
- Bash script to automate setup of Linux router useful for IoT device traffic analysis and SSL mitm☆370Updated 9 months ago
- Wireless Hacking Devices Protocol client☆178Updated this week
- system setup and scripts for various mitm activities☆73Updated 2 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆294Updated last month
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- ☆689Updated 10 months ago
- JTAGulator alternative & a hardware hacker's multi-tool for RP2040 microcontroller based development boards including RPi Pico & RP2040-Z…☆308Updated 2 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆300Updated 3 years ago
- 🤖🏴☠️ radare2 plugin for GPT-4 🦜. Solve crackmes automatically 🪄☆276Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆184Updated this week
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆182Updated 8 months ago
- A list of public attacks on BitLocker☆286Updated 3 months ago
- The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router☆239Updated 2 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Pen Test Report Generation and Assessment Collaboration☆521Updated last week
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆330Updated this week
- EMBArk - The firmware security scanning environment☆339Updated 2 weeks ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆224Updated last month
- A U-Boot hacking toolkit for security researchers and tinkerers☆269Updated 2 years ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆257Updated this week
- Quietly and anonymously bruteforce Active Directory usernames at insane speeds from Domain Controllers by (ab)using LDAP Ping requests (c…☆1,030Updated 6 months ago
- NFC signal and protocol analyzer using SDR receiver☆455Updated last month
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆318Updated last week
- A repo for TPM sniffing greatness☆224Updated 5 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- Bluetooth Security Assessment Methodology☆126Updated 11 months ago
- A tool to explore USB-C on Apple devices using the Tamarin C Hardware.☆205Updated last year
- Tool to find common vulnerabilities in cryptographic public keys☆282Updated 3 weeks ago
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago
- ☆123Updated last year