cloudshark / pi-in-the-middle
Capture traffic, export TLS keys, upload to CloudShark
☆65Updated 5 years ago
Alternatives and similar repositories for pi-in-the-middle:
Users that are interested in pi-in-the-middle are comparing it to the libraries listed below
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆39Updated last year
- Generates several passwords based on one single word, like a company's name.☆25Updated 3 years ago
- Simple Karma Attack☆66Updated 4 years ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆52Updated 6 years ago
- A Voip Wardialer for the phreaking of 2020☆54Updated 6 months ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆68Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- Auto discover and exploit LAN raspberry pi's☆106Updated 9 months ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Mobile UI for kismet☆179Updated 3 months ago
- Kismapping is a WiFi heatmapping tool which consumes Kismet output and produces a heatmap. It also serves a google maps web page with the…☆52Updated 4 years ago
- MacGeiger - a tool to track down the location of WIFI APs with sound (Geigercounter-like)☆52Updated 3 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆31Updated 3 years ago
- Scripts and more for the Wyze camera☆86Updated 5 years ago
- An HTTP and HTTPS sniffing tool created using a Raspberry Pi☆82Updated 6 years ago
- Get clients and access points.☆49Updated 5 years ago
- The ChromeCast Exploitation Kit☆37Updated last year
- A mDNS sniffer and interpreter.☆86Updated last year
- An all-in-one briefcase for pentesting, OSINT and radio exploration☆78Updated 5 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆25Updated 6 years ago
- Network Forensic Extendable Analysis Tool☆38Updated 2 years ago
- Check if your provider is blocking you!☆104Updated 2 years ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆169Updated 8 months ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆49Updated 7 years ago
- Detect and alert when Rogue AP and Deauth attacks occur☆12Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆170Updated 3 years ago
- Nmap Web Interface including XML parsing, maps and reports☆49Updated 3 years ago
- FTP Honeypot☆30Updated 11 months ago