Framework for Man-In-The-Middle attacks
☆15Feb 19, 2018Updated 8 years ago
Alternatives and similar repositories for MITMf
Users that are interested in MITMf are comparing it to the libraries listed below
Sorting:
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- A Remote Administration Tool coded in C#☆19Jul 5, 2012Updated 13 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- BiteTheBot - Smart menu ordering system☆13Dec 6, 2018Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- set up a ghost blog on tor in under 2 minutes☆18Mar 6, 2016Updated 10 years ago
- ☆18Oct 2, 2018Updated 7 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 12 years ago
- Chat protocol for secure decentralized communication over a mesh network over the internet.☆17Mar 10, 2020Updated 6 years ago
- ZPU - the worlds smallest 32 bit CPU with GCC toolchain☆16Jul 17, 2014Updated 11 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Interfaces with a Metasploit RPC instance to generate .NET executables that run x86/x64 shell code in a platform-agnostic way. One binary…☆24Sep 28, 2017Updated 8 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- A simple script for translating IP addresses to GeoLocations☆51May 1, 2022Updated 3 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆20Mar 10, 2017Updated 9 years ago
- iSpy for iOS allows you to show UIView's size, cpu/memory/network information, and update any UIView's properties at runtime.☆11Mar 24, 2016Updated 9 years ago
- Javascript library fuzzer. Tries to detect functions which may lead to XSS vulnerabilities if untrusted data is passed to said functions.☆16Oct 6, 2020Updated 5 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Jun 28, 2020Updated 5 years ago
- Packer stuff to build a Kali 1.0.9 vagrant box☆18Mar 11, 2015Updated 11 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 11 months ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆245Feb 3, 2025Updated last year
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago