praetorian-inc / mitm-vm
An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.
☆196Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for mitm-vm
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- Wolves Among the Sheep☆147Updated last year
- Automated Responder/secretsdump.py cracking☆181Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆121Updated 5 years ago
- proxy poc implementation of STARTTLS stripping attacks☆166Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆241Updated 10 years ago
- Public repository for improvements to the EXTRABACON exploit☆158Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 12 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- ☆111Updated 7 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 7 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆213Updated 7 years ago
- A transparent proxy that can modify and drop traffic for arbitrary TCP connections.☆275Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Published security vulnerabilities, research, and associated information.☆136Updated 4 years ago