cortesi / mitmproxyLinks
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
☆59Updated 7 years ago
Alternatives and similar repositories for mitmproxy
Users that are interested in mitmproxy are comparing it to the libraries listed below
Sorting:
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- ☆56Updated 8 years ago
- This project is now part of @mitmproxy.☆197Updated 8 years ago
- ☆135Updated 10 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 10 years ago
- wifitap updated for BT5r3☆152Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆376Updated 3 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- This is a LEGACY repo head to☆134Updated last year
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 10 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- a MITM attack tool☆85Updated 10 years ago
- Fighting against ransomware using honeypots☆177Updated 4 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 12 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆245Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆203Updated 9 years ago
- HTTP Header Analysis Vulnerability Tool☆115Updated 4 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆39Updated 10 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago