kr1tzy / MITMProxy_PWNageLinks
🕷️MITMProxy + Ettercap = PWNd
☆12Updated 6 years ago
Alternatives and similar repositories for MITMProxy_PWNage
Users that are interested in MITMProxy_PWNage are comparing it to the libraries listed below
Sorting:
- Wordlist generated using leaked databases, Pipal, and CUPP.☆35Updated 7 years ago
- A simple script for translating IP addresses to GeoLocations☆46Updated 3 years ago
- Automating and Enhancing Nmap using Python☆17Updated 7 years ago
- konboot iso and Sticky key backddoor.☆23Updated 6 years ago
- OSINT license plate data by scraping lookup site(s)☆12Updated 2 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆41Updated 3 years ago
- Get trails tool: Get all urls indexed of target☆22Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Updated 7 years ago
- Code, data, and (possibly) schematics for recording wireless network data around a city☆12Updated 12 years ago
- An awesome list of honeypot resources. With repository stars⭐ and forks🍴☆23Updated this week
- Handshake cracker☆52Updated 2 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Updated 5 years ago
- Lookup phone numbers’ carriers by screen-scraping FreeCarrierLookup.com☆20Updated 3 weeks ago
- WPScan is a black box WordPress vulnerability scanner.☆11Updated 8 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Updated last year
- BlackArch Linux Keyring☆23Updated 7 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Maltego integration of https://abusix.com☆17Updated 7 years ago
- ☆16Updated 2 years ago
- This is a setup for a Tor based mail hosting server☆26Updated 7 months ago
- Chrome extension designed for WordPress Vulnerability Scanning and information gathering!☆113Updated 2 years ago
- Docker environment for hackers☆17Updated 5 years ago
- Makes email "scary" to disrupt NSA surveillance☆35Updated 11 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- ☆79Updated 3 months ago
- Create Containerized Clearnet Proxies☆31Updated 6 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago