byt3bl33d3r / sslstrip2Links
A mirror of the original SSLstrip+ code by Leonardo Nve
☆182Updated 7 years ago
Alternatives and similar repositories for sslstrip2
Users that are interested in sslstrip2 are comparing it to the libraries listed below
Sorting:
- Offensive DNS server☆66Updated 7 years ago
- SSLStrip version to defeat HSTS☆318Updated 7 years ago
- Offensive DNS server☆320Updated 3 years ago
- Metasploit AV Evasion Tool☆259Updated 9 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆138Updated 3 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 6 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆194Updated 6 years ago
- Poison, reset, spoof, redirect MITM script☆128Updated 2 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆158Updated 9 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- WIreless Hacking Tools☆166Updated 12 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆290Updated 6 years ago
- Framework for Man-In-The-Middle attacks☆188Updated 8 years ago
- A JBoss script for obtaining remote shell access☆176Updated 5 years ago
- Create fake AP in Kali with 1 command☆269Updated 9 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- ☆284Updated 10 years ago
- ☆227Updated last year
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 6 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆228Updated 7 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆137Updated 9 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆115Updated 9 years ago
- Snarf man-in-the-middle / relay suite☆206Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Updated 8 years ago
- ☆195Updated 6 years ago
- Python network tool, similar to Netcat with custom features.☆195Updated 8 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆294Updated 9 months ago
- A web scraper for generating password files based on plain text found☆127Updated 2 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆255Updated 7 years ago