cortesi / mitmproxy
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
β59Updated 6 years ago
Alternatives and similar repositories for mitmproxy
Users that are interested in mitmproxy are comparing it to the libraries listed below
Sorting:
- β56Updated 7 years ago
- π₯ A checker site for MS15-034 / CVE-2015-1635β38Updated 9 years ago
- Android wireless karma attack detectorβ66Updated 9 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.β54Updated 9 years ago
- Proof of Concept code for CVE-2016-5696β101Updated 8 years ago
- PoC app for raw pdu manipulation on Android.β120Updated 9 years ago
- This project is now part of @mitmproxy.β196Updated 8 years ago
- Hashcrack.org GPU-accelerated password crackerβ84Updated 9 years ago
- Some tools to monitor BillGates CnC serversβ135Updated 11 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communicationsβ930Updated 9 years ago
- YAPDNSβ39Updated 9 years ago
- Check UNIX/Linux systems for privilege escalationβ124Updated 9 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)β80Updated 7 years ago
- A simple way for detection the remote user's antivirusβ85Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.β308Updated 11 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.β77Updated 11 years ago
- This is a LEGACY repo head toβ134Updated last year
- A tool for scrapping the possible malware from the Wikileaks AKP leakβ101Updated 8 years ago
- BlackNurse attack PoCβ173Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfersβ229Updated 8 years ago
- β74Updated 12 years ago
- β41Updated 8 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) caβ¦β94Updated 9 years ago
- Fancy Bear Source Codeβ261Updated 8 years ago
- A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local networkβ54Updated 8 years ago
- Automatic detection of hashing algorithmsβ20Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.β33Updated 8 years ago
- spectrum monitoring system for GSM providersβ44Updated 9 years ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabiβ¦β33Updated 8 years ago
- wifitap updated for BT5r3β153Updated 8 years ago