chorn / mitm-detector
Man in the middle detection tools
☆52Updated 4 years ago
Alternatives and similar repositories for mitm-detector:
Users that are interested in mitm-detector are comparing it to the libraries listed below
- Python wrapper for the OnionOO tor status API☆33Updated 7 years ago
- ☆12Updated 8 years ago
- Panic button for protection against cold boot attacks☆140Updated 2 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Docker configs and build scripts.☆22Updated 10 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- A tool (and library) for TACKs☆25Updated 7 years ago
- Adversary Lab is a service that analyzes captured network traffic to extract statistical properties. Using this analysis, filtering rules…☆21Updated 3 months ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆100Updated 11 years ago
- Funnel is a lightweight yara-based feed scraper☆39Updated last year
- Simple ways to 0wn simple IOT devices☆65Updated 9 years ago
- apbleed☆24Updated 10 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆75Updated 8 months ago
- Perl library for SHODAN☆17Updated 11 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- ☆38Updated 8 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 11 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- A list of wireless cards tested with the dual-card injection test and in the field☆25Updated 6 years ago
- Headless Chrome-based browser☆62Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 9 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Sierra network activity list☆27Updated 6 years ago