byt3bl33d3r / MITMf
Framework for Man-In-The-Middle attacks
☆3,611Updated 6 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below
Sorting:
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,118Updated 5 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,502Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,670Updated 5 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,375Updated last year
- Veil Evasion is no longer supported, use Veil 3.0!☆1,834Updated 3 years ago
- Inject code and spy on wifi users☆2,599Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,667Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,095Updated last year
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,715Updated 2 months ago
- Weaponized web shell☆3,297Updated 6 months ago
- Efficient and advanced man in the middle framework☆2,099Updated 2 years ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,250Updated last week
- Exploitation Framework for Embedded Devices☆12,525Updated 2 weeks ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,603Updated 5 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,825Updated last year
- Sniffs sensitive data from interface or pcap☆1,750Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Unified repository for different Metasploit Framework payloads☆1,835Updated 2 months ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,226Updated 3 years ago
- SSH man-in-the-middle tool☆1,657Updated 3 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,779Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,000Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,334Updated 6 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,691Updated last year
- Network Attack Tool☆1,471Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,305Updated 7 months ago
- A tool to dump the login password from the current linux user☆3,945Updated last year
- ☆3,580Updated last year
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,092Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆1,645Updated 3 years ago