husam212 / MITMerLinks
Automated man-in-the-middle attack tool.
☆52Updated 11 years ago
Alternatives and similar repositories for MITMer
Users that are interested in MITMer are comparing it to the libraries listed below
Sorting:
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- A simple tool to dump users in popular forums and CMS :)☆30Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- WPS scan and pwn tool☆70Updated 5 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Simple security surveillance script for linux distributions.☆60Updated 8 years ago
- MiTM tools and scripts☆19Updated 10 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Show info about the author by facebook photo url☆39Updated 8 years ago
- Wi-Fi Backdoors☆39Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- A facebook profile and reconnaissance system☆57Updated 10 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 11 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 9 years ago
- Stagefright Android exploit☆18Updated 3 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
- ☆90Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 9 years ago
- new WPS attack tool☆55Updated 10 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago