byt3bl33d3r / MITMfLinks
Framework for Man-In-The-Middle attacks
☆3,637Updated 7 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below
Sorting:
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,150Updated 5 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,843Updated 4 years ago
- Inject code and spy on wifi users☆2,615Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆1,810Updated 2 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,434Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,197Updated 2 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Updated 6 years ago
- Efficient and advanced man in the middle framework☆2,162Updated 2 years ago
- Network Attack Tool☆1,491Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Updated 7 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,030Updated 4 years ago
- Unified repository for different Metasploit Framework payloads☆1,959Updated last week
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Updated 7 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,896Updated 2 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Updated 4 years ago
- Weaponized web shell☆3,477Updated 4 months ago
- Ettercap Project☆2,672Updated last week
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,260Updated 4 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,010Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Updated 5 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,845Updated 8 months ago
- Network Infrastructure Penetration Testing Tool☆1,670Updated 4 years ago
- Python botnet and backdoor☆1,610Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,798Updated 6 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Updated last year
- wireless hacking - This is automated wireless hacking tool☆1,281Updated 3 years ago
- Undetectable Windows Payload Generation☆1,608Updated 3 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,209Updated 4 years ago
- Ncrack network authentication tool☆1,191Updated last year