byt3bl33d3r / MITMfLinks
Framework for Man-In-The-Middle attacks
☆3,613Updated 6 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below
Sorting:
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,122Updated 5 years ago
- Inject code and spy on wifi users☆2,600Updated 3 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,380Updated last year
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,502Updated 7 years ago
- Efficient and advanced man in the middle framework☆2,102Updated 2 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,835Updated 3 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,673Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,106Updated last year
- Network Attack Tool☆1,470Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,335Updated 6 years ago
- wireless hacking - This is automated wireless hacking tool☆1,255Updated 2 years ago
- Sniffs sensitive data from interface or pcap☆1,753Updated last year
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,094Updated 6 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,706Updated last year
- Continuously jam all wifi clients/routers☆4,088Updated 10 months ago
- Exploitation Framework for Embedded Devices☆12,556Updated last month
- Undetectable Windows Payload Generation☆1,598Updated 2 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,277Updated 2 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,834Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,729Updated last week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,411Updated 6 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,315Updated 8 months ago
- Unified repository for different Metasploit Framework payloads☆1,842Updated last week
- Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes wit…☆1,199Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,621Updated 5 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,651Updated last week
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,001Updated 3 years ago
- ☆3,442Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,347Updated last year