mh4x0f / mitmkinLinks
moduled sniffer TCP/UDP Proxy for man-in-the-middle attack
☆16Updated 7 years ago
Alternatives and similar repositories for mitmkin
Users that are interested in mitmkin are comparing it to the libraries listed below
Sorting:
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Efficient clustering of MASSCAN results☆12Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- ☆27Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- Create a DDOS attack using SNMP servers☆44Updated 11 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆30Updated 9 years ago
- ☆20Updated 2 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Updated 12 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Updated 10 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Updated 10 years ago
- a javascript keylogger included in a gif file☆39Updated 5 months ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Updated 10 years ago
- C++ Keylogger for windows 7. Works with DLL injection on explorer.exe☆26Updated 11 years ago
- A simple reflective dll example☆19Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Updated last month
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago