daniel4x / mitm-python
A simple as possible man in the middle written in python using scapy
☆9Updated 6 years ago
Alternatives and similar repositories for mitm-python:
Users that are interested in mitm-python are comparing it to the libraries listed below
- Python code to extract chrome cookie, history and login data files☆58Updated 7 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆56Updated 5 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆33Updated 7 years ago
- Reverse Shell for Android☆23Updated 10 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 5 years ago
- Fix Kali 2 Sana issues and post install script for various tools☆18Updated 8 years ago
- Encrypted chat application in python☆55Updated 6 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Dump the saved wifi passwords for windows using regular expressions and python 3☆17Updated 8 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆76Updated 6 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- simple reverse tcp backdoor hack☆63Updated 4 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Automated man-in-the-middle attack tool.☆50Updated 10 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- A ctypes powered python keylogger.☆104Updated 5 years ago
- Phishing webapp generator☆41Updated 6 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆30Updated 6 years ago
- Reverse shell for remote administration☆30Updated 7 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 7 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Simple Linux RootKit written in python☆10Updated 7 years ago
- HTTP botnet☆59Updated 8 years ago