byt3bl33d3r / MITMfLinks
Framework for Man-In-The-Middle attacks
☆3,624Updated 6 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below
Sorting:
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,127Updated 5 years ago
- Inject code and spy on wifi users☆2,604Updated 4 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,500Updated 7 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,679Updated 5 years ago
- Efficient and advanced man in the middle framework☆2,121Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,840Updated 3 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,342Updated 6 years ago
- Network Attack Tool☆1,480Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,139Updated last year
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Updated 7 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,396Updated last year
- Sniffs sensitive data from interface or pcap☆1,771Updated last year
- wireless hacking - This is automated wireless hacking tool☆1,263Updated 2 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,235Updated 3 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,769Updated 3 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,857Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,317Updated 3 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆1,983Updated 4 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,806Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,736Updated 5 years ago
- Continuously jam all wifi clients/routers☆4,144Updated last year
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,348Updated 11 months ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,169Updated 3 years ago
- pentest framework☆1,231Updated 6 years ago
- An offline Wi-Fi Protected Setup brute-force utility☆1,638Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,007Updated 4 years ago
- SSH man-in-the-middle tool☆1,683Updated 4 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,812Updated 2 years ago
- ☆1,847Updated 8 months ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,421Updated 6 years ago