cortesi / mitmproxyLinks
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
☆59Updated 7 years ago
Alternatives and similar repositories for mitmproxy
Users that are interested in mitmproxy are comparing it to the libraries listed below
Sorting:
- ☆56Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 10 years ago
- ☆135Updated 10 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆930Updated 9 years ago
- This is a LEGACY repo head to☆134Updated last year
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆201Updated 9 years ago
- This project is now part of @mitmproxy.☆197Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆39Updated 10 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 6 years ago
- a MITM attack tool☆85Updated 10 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- ☆73Updated 12 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- The NoSQL Honeypot Framework☆102Updated 2 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago