Framework for Man-In-The-Middle attacks
☆15Feb 19, 2018Updated 8 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below
Sorting:
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- Miscellaneous projects related to attacking Windows.☆28Jun 18, 2019Updated 6 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- Checks to see when the cert for a given domain expires.☆19May 1, 2022Updated 3 years ago
- Big Iron Recon & Pwnage☆125Nov 8, 2021Updated 4 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Setup files for the Channel Feed Manager suite of tools for Roku and Amazon.☆12Jan 30, 2026Updated last month
- ☆12Jul 29, 2019Updated 6 years ago
- The repository accompanying the Buer Emulation workshop☆23Aug 18, 2021Updated 4 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆27Jul 28, 2018Updated 7 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- A lightweight ducky script generator written in python.☆36Feb 6, 2021Updated 5 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Dec 12, 2024Updated last year
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Deep learning techniques for 5G NR and 4G LTE signal detection and identification☆15Jun 12, 2025Updated 8 months ago
- ☆38Feb 26, 2025Updated last year
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- A module for CME that spiders across a domain.☆35Jul 15, 2022Updated 3 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- RRG / Iceman repo - Proxmark3 / Proxmark / RFID / NFC☆34Jul 13, 2023Updated 2 years ago
- A OSINT tool to obtain a target's phone number just by having his email address☆32Sep 16, 2019Updated 6 years ago
- Docker images for learning wifi hacking☆69Oct 26, 2018Updated 7 years ago
- Face detection and recognition library that focuses on speed and ease of use.☆34Feb 8, 2021Updated 5 years ago