daniel4x / mitm-pythonLinks
A simple as possible man in the middle written in python using scapy
☆10Updated 6 years ago
Alternatives and similar repositories for mitm-python
Users that are interested in mitm-python are comparing it to the libraries listed below
Sorting:
- Bind 2 exe's and have them run at the same time.☆48Updated 10 years ago
- simple reverse tcp backdoor hack☆63Updated 5 years ago
- A ctypes powered python keylogger.☆109Updated 5 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆54Updated 10 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆63Updated 6 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 8 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆87Updated 6 years ago
- Capstone: Keylogger Trojan☆35Updated 7 years ago
- arp-poison (aka arp spoof) tool☆42Updated 12 years ago
- The router hacking repo.☆33Updated 10 years ago
- Python code to extract chrome cookie, history and login data files☆59Updated 8 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 7 years ago
- A reverse shell cheat-sheet tool☆39Updated 6 years ago
- Kill Any Antivirus Using Python For Windows Users .☆48Updated 9 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- flood area with fake essids☆21Updated 8 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Small backdoor using cookie.☆64Updated 9 years ago
- Krack POC☆125Updated 7 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- The Keylogger is able to capture all the keystrokes using system hooks. In addition to this, it is also able to put them into a file, enc…☆62Updated 7 years ago
- Post-Exploitation Framework☆78Updated 8 years ago