byt3bl33d3r / MITMf
Framework for Man-In-The-Middle attacks
☆3,585Updated 6 years ago
Alternatives and similar repositories for MITMf:
Users that are interested in MITMf are comparing it to the libraries listed below
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,103Updated 4 years ago
- Efficient and advanced man in the middle framework☆2,059Updated last year
- Inject code and spy on wifi users☆2,592Updated 3 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,827Updated 3 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,500Updated 6 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,663Updated 5 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,474Updated this week
- Ettercap Project☆2,425Updated 6 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,038Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,534Updated 9 months ago
- Network Attack Tool☆1,448Updated last year
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,336Updated last year
- Sniffs sensitive data from interface or pcap☆1,718Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,771Updated 11 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,296Updated 3 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,626Updated 3 months ago
- wireless hacking - This is automated wireless hacking tool☆1,244Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,231Updated 3 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆4,682Updated this week
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,210Updated 3 years ago
- Continuously jam all wifi clients/routers☆4,044Updated 5 months ago
- Automatically install all Kali linux tools☆4,816Updated 8 months ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆1,944Updated 3 years ago
- Exploitation Framework for Embedded Devices☆12,300Updated this week
- Undetectable Windows Payload Generation☆1,567Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,220Updated 2 years ago
- SSH man-in-the-middle tool☆1,638Updated 3 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,299Updated 3 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,122Updated 2 years ago
- Weaponized web shell☆3,234Updated 3 months ago