m4n3dw0lf / sslkill
Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy
☆62Updated 5 years ago
Alternatives and similar repositories for sslkill:
Users that are interested in sslkill are comparing it to the libraries listed below
- Poison, reset, spoof, redirect MITM script☆126Updated last year
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 5 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Credentials recovery project☆44Updated 8 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆85Updated 5 years ago
- Post-Exploitation Framework☆75Updated 8 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- myBFF - a Brute Force Framework☆139Updated last week
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆67Updated 9 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆121Updated 9 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆86Updated 9 years ago
- apk binder script☆60Updated 10 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago