mh4x0f / mitmkinLinks
moduled sniffer TCP/UDP Proxy for man-in-the-middle attack
☆16Updated 7 years ago
Alternatives and similar repositories for mitmkin
Users that are interested in mitmkin are comparing it to the libraries listed below
Sorting:
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- ☆54Updated 8 years ago
- SSH Based Remote Administration Tool☆104Updated 10 years ago
- 0x88 exploit pack Decoded☆28Updated 11 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 9 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Updated 10 years ago
- cross site scripting framework plugin for metasploit☆17Updated 13 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Patch pyc files with your code. Fairly lame.☆68Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆29Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy☆62Updated 5 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- ☆78Updated 6 years ago
- A curated list of rootkits found on Github and other sites.☆64Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 9 months ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago