daniel4x / mitm-python
A simple as possible man in the middle written in python using scapy
☆9Updated 6 years ago
Alternatives and similar repositories for mitm-python:
Users that are interested in mitm-python are comparing it to the libraries listed below
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- steal cookies from firefox cookies database(cookies.sqlite)☆55Updated 9 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 7 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 5 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit☆152Updated 7 years ago
- ☆57Updated 5 years ago
- Small backdoor using cookie.☆60Updated 8 years ago
- Python 2.7 is obsolete, please use https://github.com/xp4xbox/Python-Keylogger☆50Updated 5 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Know the dangers of credential reuse attacks.☆7Updated 6 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Updated 6 years ago
- imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basi…☆77Updated 6 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Updated 8 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Updated 9 months ago
- Dump the saved wifi passwords for windows using regular expressions and python 3☆17Updated 8 years ago