Framework for Man-In-The-Middle attacks
☆15Feb 19, 2018Updated 8 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Checks to see when the cert for a given domain expires.☆19May 1, 2022Updated 4 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 9 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆21Dec 23, 2017Updated 8 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- A Ruby script that takes in IPs and returns Country, State, and City☆42May 1, 2022Updated 4 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- An easy user interface for pentesting tools☆11Jun 13, 2021Updated 4 years ago
- ☆18Oct 2, 2018Updated 7 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 13 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple script for translating IP addresses to GeoLocations☆52May 1, 2022Updated 4 years ago
- config files such as .vimrc, .bashrc, etc.☆17May 6, 2011Updated 15 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆20Mar 10, 2017Updated 9 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 10 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Packer stuff to build a Kali 1.0.9 vagrant box☆18Mar 11, 2015Updated 11 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆291Apr 14, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 12 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆246Feb 3, 2025Updated last year
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- The source code for the simple bot we created in a video.☆10Feb 26, 2018Updated 8 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 4 years ago