moxie0 / chapcrack
☆380Updated 12 years ago
Alternatives and similar repositories for chapcrack:
Users that are interested in chapcrack are comparing it to the libraries listed below
- Automated Linux evil maid attack☆426Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆174Updated 9 years ago
- NTP Main-in-the-Middle tool☆245Updated 3 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆197Updated 8 years ago
- ☆224Updated 10 months ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- ☆426Updated 7 years ago
- SSLStrip version to defeat HSTS☆318Updated 7 years ago
- Mallory - MiTM TCP and UDP Proxy☆317Updated 2 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆363Updated 10 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆342Updated 8 years ago
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆383Updated 2 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆259Updated 8 years ago
- Specify targets and run sets of tools against them☆389Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- ☆142Updated 8 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆521Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections☆241Updated 8 years ago
- ☆206Updated 7 years ago
- Automated Responder/secretsdump.py cracking☆185Updated 8 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆172Updated 8 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆241Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 8 years ago