byt3bl33d3r / sslstrip2Links
A mirror of the original SSLstrip+ code by Leonardo Nve
☆182Updated 7 years ago
Alternatives and similar repositories for sslstrip2
Users that are interested in sslstrip2 are comparing it to the libraries listed below
Sorting:
- Offensive DNS server☆66Updated 7 years ago
- SSLStrip version to defeat HSTS☆318Updated 7 years ago
- Offensive DNS server☆320Updated 3 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆138Updated 4 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆137Updated 9 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 7 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆127Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- ☆284Updated 10 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Updated 6 years ago
- A JBoss script for obtaining remote shell access☆176Updated 5 years ago
- WIreless Hacking Tools☆166Updated 12 years ago
- My collection of metasploit auxiliary post-modules☆192Updated 6 years ago
- ☆229Updated last year
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆290Updated 6 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago
- Modified hostapd to facilitate AP impersonation attacks☆514Updated 7 years ago
- ☆195Updated 6 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆296Updated 10 months ago
- Exploits and Security Tools Framework 2.0.1☆307Updated 2 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 9 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆158Updated 9 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆229Updated 7 years ago