byt3bl33d3r / MITMfLinks
Framework for Man-In-The-Middle attacks
☆3,637Updated 7 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below
Sorting:
- Inject code and spy on wifi users☆2,615Updated 4 years ago
- DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3☆3,150Updated 5 years ago
- Efficient and advanced man in the middle framework☆2,162Updated 2 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,495Updated 7 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,843Updated 4 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,197Updated 2 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,098Updated 7 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,260Updated 4 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,940Updated last year
- Network Attack Tool☆1,491Updated 2 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,434Updated 2 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Updated 7 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,030Updated 4 years ago
- wireless hacking - This is automated wireless hacking tool☆1,281Updated 3 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,322Updated 4 years ago
- Sniffs sensitive data from interface or pcap☆1,811Updated 2 years ago
- Ettercap Project☆2,672Updated last week
- Continuously jam all wifi clients/routers☆4,214Updated last year
- Undetectable Windows Payload Generation☆1,608Updated 3 years ago
- ☆1,911Updated 3 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,845Updated 8 months ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,336Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,896Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,438Updated 7 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Updated 5 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,457Updated last year
- SSH man-in-the-middle tool☆1,732Updated 4 years ago
- Automated Mass Exploiter☆5,208Updated 2 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,010Updated 4 years ago