evilsocket / bettercap-proxy-modules
This repository contains some bettercap transparent proxy example modules.
☆281Updated 7 years ago
Alternatives and similar repositories for bettercap-proxy-modules:
Users that are interested in bettercap-proxy-modules are comparing it to the libraries listed below
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆344Updated 8 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆342Updated 2 years ago
- ☆339Updated 8 years ago
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- Recon, Subdomain Bruting, Zone Transfers☆228Updated 8 years ago
- Metasploit AV Evasion Tool☆258Updated 9 years ago
- A web front-end for password cracking and analytics☆624Updated 3 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- BlackNurse attack PoC☆171Updated 8 years ago
- Compilation of ready to run exploits, advisories, tools and online key generators for embedded devices.☆135Updated 8 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- Create fake AP in Kali with 1 command☆268Updated 9 years ago
- Various PoCs☆490Updated 5 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆355Updated 2 years ago
- Mallory - MiTM TCP and UDP Proxy☆314Updated 2 years ago
- A webshell framework for penetration testers.☆297Updated 10 months ago
- BadUSB 2.0 USB-HID MiTM POC☆283Updated 8 years ago
- Cartero - Social Engineering Framework☆171Updated 4 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆489Updated 3 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,090Updated 6 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆274Updated 9 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 4 months ago
- Fancy Bear Source Code☆261Updated 8 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- Modified hostapd to facilitate AP impersonation attacks☆503Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago