cortesi / mitmproxyLinks
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
☆59Updated 7 years ago
Alternatives and similar repositories for mitmproxy
Users that are interested in mitmproxy are comparing it to the libraries listed below
Sorting:
- ☆135Updated 9 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- ☆56Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- A powerful and extensible wireless drop box☆267Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆376Updated 3 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆932Updated 9 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 9 years ago
- This is a LEGACY repo head to☆134Updated last year
- a MITM attack tool☆85Updated 9 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Android wireless karma attack detector☆67Updated 9 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- This project is now part of @mitmproxy.☆196Updated 8 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- wifitap updated for BT5r3☆153Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆183Updated 2 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- A python2 script for processing a PCAP file to decrypt C2 traffic sent to DOUBLEPULSAR implant☆225Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago