mh4x0f / mitmkinLinks
moduled sniffer TCP/UDP Proxy for man-in-the-middle attack
☆16Updated 6 years ago
Alternatives and similar repositories for mitmkin
Users that are interested in mitmkin are comparing it to the libraries listed below
Sorting:
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 8 months ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- Network Guardian☆12Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Advanced Netstat Using Python For Windows☆46Updated 7 years ago
- CDDC Exploitation Framework☆13Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- My metasploit modules☆11Updated 10 years ago
- ☆23Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 4 months ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 3 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- DHCP attack tool☆20Updated 10 months ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago