cortesi / mitmproxy
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
☆59Updated 6 years ago
Alternatives and similar repositories for mitmproxy:
Users that are interested in mitmproxy are comparing it to the libraries listed below
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 8 years ago
- This is a LEGACY repo head to☆134Updated 10 months ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆124Updated 8 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- Fancy Bear Source Code☆260Updated 8 years ago
- PoC app for raw pdu manipulation on Android.☆120Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 6 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- Probably one of the smallest SSL MITM proxies you can make☆181Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- This project is now part of @mitmproxy.☆197Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- ☆56Updated 7 years ago
- Tools for 802.11 information gathering.☆118Updated 2 years ago
- a MITM attack tool☆84Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆114Updated 4 years ago
- ☆74Updated 11 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆93Updated 8 years ago
- ☆135Updated 9 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 6 years ago
- Wolves Among the Sheep☆147Updated last year
- Simulates enough of a Telnet connection in order to log failed login attempts.☆238Updated 7 years ago
- proxy poc implementation of STARTTLS stripping attacks☆166Updated 3 years ago