moxie0 / sslsniffLinks
A tool for automated MITM attacks on SSL connections.
☆556Updated 7 years ago
Alternatives and similar repositories for sslsniff
Users that are interested in sslsniff are comparing it to the libraries listed below
Sorting:
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆1,977Updated 4 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,002Updated 3 years ago
- ☆380Updated 12 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆675Updated 6 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Mallory - MiTM TCP and UDP Proxy☆318Updated 3 years ago
- Transparent SSL/TLS interception☆1,801Updated 9 months ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- Protect your Wireless Network from Evil Access Points!☆182Updated last year
- Nameserver DNS poisoning attacks made easy☆523Updated 8 years ago
- SSLStrip version to defeat HSTS☆319Updated 7 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆843Updated last week
- Fake sshd that logs ip addresses, usernames, and passwords.☆197Updated 8 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- ☆474Updated 10 months ago
- SSH man-in-the-middle tool☆1,664Updated 3 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆304Updated 3 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆349Updated 2 years ago
- NTP Main-in-the-Middle tool☆245Updated 3 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- This repository contains some bettercap transparent proxy example modules.☆283Updated 7 years ago
- Malicious HTTP traffic explorer☆717Updated 2 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago
- Modified hostapd to facilitate AP impersonation attacks☆510Updated 7 years ago
- for the louise☆242Updated 4 years ago
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆841Updated 4 months ago
- A tool to fingerprint SSL/TLS servers☆268Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago