cortesi / mitmproxyLinks
An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
☆59Updated 7 years ago
Alternatives and similar repositories for mitmproxy
Users that are interested in mitmproxy are comparing it to the libraries listed below
Sorting:
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- This project is now part of @mitmproxy.☆196Updated 8 years ago
- ☆56Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 10 years ago
- PoC app for raw pdu manipulation on Android.☆121Updated 9 years ago
- A small command-line TCP proxy utility written in Python☆156Updated 6 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Secure end-to-end encrypted file sharing over ssh; forked from openssh.☆64Updated 3 years ago
- This is a LEGACY repo head to☆134Updated last year
- ☆135Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- wifitap updated for BT5r3☆153Updated 8 years ago
- Tools to help detect Hacking Team malware☆79Updated 9 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆242Updated 8 years ago
- Automatic detection of hashing algorithms☆20Updated 9 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago
- Fancy Bear Source Code☆261Updated 8 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆182Updated 2 years ago
- Free sampling of files from the purported Equation Group hack.☆188Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago