moxie0 / sslsniffLinks
A tool for automated MITM attacks on SSL connections.
☆557Updated 7 years ago
Alternatives and similar repositories for sslsniff
Users that are interested in sslsniff are comparing it to the libraries listed below
Sorting:
- ☆382Updated 13 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆1,996Updated 4 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Updated last year
- SSLStrip version to defeat HSTS☆320Updated 8 years ago
- Automated Linux evil maid attack☆431Updated 9 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,005Updated 4 years ago
- Mallory - MiTM TCP and UDP Proxy☆322Updated 3 years ago
- Quantum Insert☆213Updated 6 years ago
- Transparent SSL/TLS interception☆1,824Updated last year
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆708Updated 8 years ago
- SSL/TLS layers for scapy the interactive packet manipulation tool☆426Updated 4 years ago
- Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆310Updated 3 years ago
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,099Updated 7 years ago
- A framework for BREACH and other compression-based crypto attacks☆233Updated 5 years ago
- O-Saft - OWASP SSL advanced forensic tool☆382Updated 2 months ago
- Specify targets and run sets of tools against them☆386Updated 6 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆201Updated 9 years ago
- Sockstress (TCP DoS) implementation.☆208Updated last year
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,285Updated 6 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- Fake wireless Access Point (AP) implementation using Python and Scapy, intended for convenient testing of 802.11 protocols and implementa…☆247Updated 10 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆410Updated 2 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆346Updated 8 years ago
- Various PoCs☆491Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆221Updated 8 years ago