brannondorsey / mitm-routerLinks
β Man-in-the-middle wireless access point inside a docker container π³
β457Updated 7 years ago
Alternatives and similar repositories for mitm-router
Users that are interested in mitm-router are comparing it to the libraries listed below
Sorting:
- intercepting kali routerβ443Updated 8 years ago
- SSLStrip version to defeat HSTSβ323Updated 8 years ago
- Nameserver DNS poisoning attacks made easyβ525Updated 8 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ361Updated 5 months ago
- π· A lightning fast multithreaded network scanner framework with modules.β322Updated 6 years ago
- NTP Main-in-the-Middle toolβ250Updated 3 years ago
- π A tool for sniffing unencrypted wireless probe requests from devices.β337Updated 6 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.β273Updated 11 years ago
- Detect and prevent KRACK attacks in your networkβ183Updated 8 years ago
- πCrack hashes using online rainbow & lookup table attack services, right from your terminal.β234Updated 3 years ago
- Offensive DNS serverβ323Updated 4 years ago
- This repository contains some bettercap transparent proxy example modules.β281Updated 7 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerabilityβ472Updated 8 years ago
- Automated Linux evil maid attackβ434Updated 10 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scanβ373Updated 2 years ago
- A webshell framework for penetration testers.β300Updated 5 months ago
- Plug-and-play bash script for sniffing 802.11 probes requestsβ252Updated 7 years ago
- A powerful and extensible wireless drop boxβ267Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.β537Updated 3 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!β257Updated 8 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,092Updated 6 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.β347Updated 9 years ago
- β484Updated 3 months ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing β¦β592Updated 3 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.β200Updated 9 years ago
- Protect your Wireless Network from Evil Access Points!β183Updated 2 years ago
- Modified hostapd to facilitate AP impersonation attacksβ518Updated 7 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.β412Updated 2 years ago
- Local Privilege Escalationβ209Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unplβ¦β583Updated 8 years ago