mh4x0f / mitmkinLinks
moduled sniffer TCP/UDP Proxy for man-in-the-middle attack
☆16Updated 7 years ago
Alternatives and similar repositories for mitmkin
Users that are interested in mitmkin are comparing it to the libraries listed below
Sorting:
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆50Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- lulz: automated webstalking tool☆53Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- Projects and POCs☆61Updated 11 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 11 months ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- a javascript keylogger included in a gif file☆39Updated 3 months ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago