cloudshark / pi-in-the-middleLinks
Capture traffic, export TLS keys, upload to CloudShark
☆68Updated 6 years ago
Alternatives and similar repositories for pi-in-the-middle
Users that are interested in pi-in-the-middle are comparing it to the libraries listed below
Sorting:
- Auto discover and exploit LAN raspberry pi's☆107Updated last year
- Project to assist users in building an encrypted raspberry pi☆66Updated last year
- Generates several passwords based on one single word, like a company's name.☆26Updated 3 years ago
- Bluetooth Network Access Point☆165Updated 8 years ago
- A highly configurable Linux Bluetooth scanner with optional web interface.☆124Updated 6 years ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆49Updated 6 years ago
- The pocket-sized wireless sniffer☆217Updated 3 years ago
- RasPwn OS☆60Updated 8 years ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆175Updated last year
- An all-in-one briefcase for pentesting, OSINT and radio exploration☆80Updated 6 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆70Updated 8 months ago
- Poor mans Bash Bunny☆85Updated 7 years ago
- IntelOwl's Web Interface. Built with Angular 10.☆88Updated 2 years ago
- A graphical network monitor for Unix modeled after etherman.☆52Updated 10 years ago
- Scripts and more for the Wyze camera☆86Updated 5 years ago
- Routopsy - Hacking Routers with Routers☆176Updated 3 years ago
- Nmap Web Interface including XML parsing, maps and reports☆54Updated 4 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆46Updated 4 years ago
- Selective wifi jammer - control who can connect where☆46Updated 7 years ago
- The ChromeCast Exploitation Kit☆38Updated last year
- Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.☆51Updated 8 years ago
- (⌐■_■) - API server for pwnagotchi.ai☆153Updated 2 years ago
- Wireless USB Rubber Ducky triggered via BLE (make your Ubertooth quack!)☆114Updated 6 years ago
- Are.We.Secure.Yet Framework aims to test the wifi security of a location, attempting to locate individual devices☆40Updated 2 years ago
- Postman collection to interact with the Shodan API☆25Updated last year
- Easily Expandable Wireless Intrusion Detection System☆31Updated 4 years ago
- A minimal tool that hides your online assets from online security scanners, researchers and hackers.☆115Updated 4 years ago
- Notifies You of Chosen People in Your Vicinity via Their Wifi Probe Requests From an Simple Web GUI☆69Updated 4 years ago
- Hashcat WPA/WPA2 server☆63Updated 4 months ago
- Self-Installing Windows OVA. Automate and distribute Windows as an OVA.☆119Updated 3 years ago