brannondorsey / mitm-routerLinks
β Man-in-the-middle wireless access point inside a docker container π³
β451Updated 7 years ago
Alternatives and similar repositories for mitm-router
Users that are interested in mitm-router are comparing it to the libraries listed below
Sorting:
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ355Updated last month
- NTP Main-in-the-Middle toolβ247Updated 3 years ago
- Detect and prevent KRACK attacks in your networkβ182Updated 7 years ago
- SSLStrip version to defeat HSTSβ321Updated 8 years ago
- intercepting kali routerβ444Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerabilityβ466Updated 8 years ago
- Offensive DNS serverβ322Updated 3 years ago
- π· A lightning fast multithreaded network scanner framework with modules.β324Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ372Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,093Updated 6 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β267Updated 11 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!β254Updated 7 years ago
- caplets and proxy modules.β508Updated 6 months ago
- Nameserver DNS poisoning attacks made easyβ525Updated 8 years ago
- π A tool for sniffing unencrypted wireless probe requests from devices.β338Updated 5 years ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β234Updated 2 years ago
- A web front-end for password cracking and analyticsβ622Updated 3 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing β¦β589Updated 3 years ago
- Automated Linux evil maid attackβ432Updated 9 years ago
- Plug-and-play bash script for sniffing 802.11 probes requestsβ250Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.β539Updated 3 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.β346Updated 8 years ago
- Modified hostapd to facilitate AP impersonation attacksβ514Updated 7 years ago
- This repository contains some bettercap transparent proxy example modules.β281Updated 7 years ago
- Various Tools and Docker Imagesβ280Updated 5 months ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.β239Updated 4 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.β268Updated 4 years ago
- My personal hacklab, create your own.β334Updated 3 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplβ¦β583Updated 8 years ago
- A powerful and extensible wireless drop boxβ267Updated 6 years ago