Capture traffic, export TLS keys, upload to CloudShark
☆69Mar 28, 2019Updated 6 years ago
Alternatives and similar repositories for pi-in-the-middle
Users that are interested in pi-in-the-middle are comparing it to the libraries listed below
Sorting:
- A tool for ethical hackers and only for cyber security experts this tool is made for Whatsapp phishing only for education purpose use it …☆29Jan 24, 2026Updated last month
- Boot Image Tool is an Android app that helps juggle boot images for OTAs.☆20May 1, 2022Updated 3 years ago
- Kexec Magisk Module☆21Oct 26, 2020Updated 5 years ago
- research tool to read/write data from/to a Ninebot ONE A1/S2☆24Mar 11, 2022Updated 3 years ago
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- USBNinja Android Remote Control Application☆32Feb 19, 2019Updated 7 years ago
- ☆78Jan 15, 2026Updated last month
- Kexec as loadable kernel module for Linux ARM64 kernels☆37Apr 1, 2023Updated 2 years ago
- Automation of VPC Traffic Mirror Sessions in AWS☆35Nov 15, 2025Updated 3 months ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- J5 2016 kernel☆10May 14, 2017Updated 8 years ago
- Using docker swarm creating the replica of account-service micro service and load balancing the requests using haproxy docker container (…☆13Apr 20, 2019Updated 6 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- A functional Arduino based oled dashboard for electric scooters like Xiaomi or Ninebot☆13Nov 25, 2021Updated 4 years ago
- ☆33Dec 14, 2025Updated 2 months ago
- Whenever the Raspberry Pi Device is turned on, it attempts to attack all the wifi networks within the area using wifite and then 📧 email…☆48Feb 20, 2022Updated 4 years ago
- Your first line of defense against Internet bots, hacks and probes. Login-Shield is a small set of bash scripts that implements an ipta…☆36Oct 5, 2025Updated 5 months ago
- 🏍Fast Home Delivery App of Grocery ,Medicines , Vegetables ,etc during lockdown . Client can send Handwritten List Photo ,Chat with Shop…☆11Jun 27, 2020Updated 5 years ago
- add the charles ssl certificate to an android .apk file. Use that modified .apk to collect HTTP traffic.☆11Mar 21, 2023Updated 2 years ago
- Python script for parsing and converting SRT files from a DJI Mini 4 Pro + 3D flight path viewer☆13Jun 15, 2024Updated last year
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- OpenLayers 3☆12Mar 25, 2019Updated 6 years ago
- API specification of the USB WiFi Monitor Android app☆25May 17, 2025Updated 9 months ago
- Simple web app with laravel build from scratch☆16Jan 4, 2022Updated 4 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- A simple windows batch script intended to look like an FBI security warning, while stealing their data onto a USB.☆10Apr 5, 2022Updated 3 years ago
- UC Berkeley Legal Studies 123 Spring 2022☆14May 28, 2025Updated 9 months ago
- ☆11Nov 18, 2020Updated 5 years ago
- Juniper SRX Firewall Dynamic Address Feeder☆12May 2, 2022Updated 3 years ago
- Proximity Detection using BLE with ESP32.☆10Apr 17, 2023Updated 2 years ago
- Homekit Doorbell for Raspberry Pi with bi-directional audio☆13Jul 12, 2020Updated 5 years ago
- 802.11 monitor mode for Android without root.☆56Oct 24, 2012Updated 13 years ago
- ☆28Apr 4, 2022Updated 3 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- The 💰web app platform.☆17Jun 5, 2021Updated 4 years ago
- Intruder.py - A powerful tool to customize attacks on websites. Has 4 different options of attacks☆12Dec 1, 2020Updated 5 years ago
- Linux kernel module that provides remote backdoor using netfilters , file and pid hiding.☆11Apr 1, 2017Updated 8 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Dockerized Zeek☆12Mar 9, 2024Updated 2 years ago