☆20Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for mc-mitm
Users that are interested in mc-mitm are comparing it to the libraries listed below
Sorting:
- ☆16Aug 14, 2024Updated last year
- An ESP8266 powered captive portal that serves uploaded images on a HTML page.☆10May 1, 2020Updated 5 years ago
- Python control library for the Faultier fault-injection tool.☆14Sep 17, 2025Updated 6 months ago
- Security hardened OpenBSD templates☆10Jun 10, 2018Updated 7 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- BLE Edition of the original FistBump (portable WPA handshake grabber)☆49Nov 24, 2018Updated 7 years ago
- An LDPC decoder block for GNU Radio☆13Nov 15, 2018Updated 7 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- Golang implementation of Graphite/Carbon server with classic architecture: Agent -> Cache -> Persister☆12Jun 16, 2019Updated 6 years ago
- COVID-19 Growth Forecast☆12Dec 13, 2022Updated 3 years ago
- A plugin for Hangfire that allows you to easily launch your powershell scripts.☆13Apr 28, 2023Updated 2 years ago
- Extensible and customizable editing widget for FLTK☆16Jun 24, 2014Updated 11 years ago
- Using the ESP-NOW protocol, we can remotely control and command a relay. In other words, we control electrical appliances with ESP-Now. I…☆15Mar 20, 2021Updated 5 years ago
- Docker container and binaries for android builds of common SDR drivers and libraries.☆19Sep 4, 2025Updated 6 months ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Firmware providing a glitch target and an OTP glitching example.☆36Aug 15, 2024Updated last year
- C-Library for unit testing.☆19Oct 8, 2021Updated 4 years ago
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆46Mar 5, 2026Updated 2 weeks ago
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines☆24Feb 20, 2024Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Sep 13, 2024Updated last year
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆56Jan 31, 2019Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- ☆13Aug 10, 2022Updated 3 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- ☆23May 22, 2016Updated 9 years ago
- ☆25Updated this week
- Code editor control for Universal Dashboard.☆10Jan 6, 2023Updated 3 years ago
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Feb 10, 2015Updated 11 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 8 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Generate dataset for keystroke timings for exploratory and research purposes.☆17Feb 20, 2025Updated last year
- A fluent SQLite Query API for Android☆20Jun 12, 2016Updated 9 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- Fragging SS7 for fun and profit☆20Nov 3, 2021Updated 4 years ago
- A way to force your wifi-pineapple to use SSL☆14Jul 26, 2017Updated 8 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago