☆21Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for mc-mitm
Users that are interested in mc-mitm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BLE Edition of the original FistBump (portable WPA handshake grabber)☆50Nov 24, 2018Updated 7 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- CrowdSec bouncer for PHP Website☆16Feb 16, 2026Updated last month
- Red Team Tool Kit☆16Mar 10, 2019Updated 7 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Empowering journalists and whistleblowers☆20Oct 16, 2021Updated 4 years ago
- A plugin for Hangfire that allows you to easily launch your powershell scripts.☆13Apr 28, 2023Updated 2 years ago
- Build a JSON Schema with functions☆12Jan 5, 2023Updated 3 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Firmware providing a glitch target and an OTP glitching example.☆36Aug 15, 2024Updated last year
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Android Google Map 2 Project to find friend location with live movement.☆10Feb 9, 2015Updated 11 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆17Sep 13, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Jul 15, 2022Updated 3 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- ☆14Aug 10, 2022Updated 3 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Open Source Vulnerability Disclosure Program☆24Oct 29, 2021Updated 4 years ago
- Code editor control for Universal Dashboard.☆10Jan 6, 2023Updated 3 years ago
- A C# Winforms based GUI app, that allows you to extract files from Drakengard 1 and 2. repacking is supported too.☆14Jul 11, 2025Updated 9 months ago
- Collection Of Terrible CNC/Qbot Panels☆11Aug 8, 2025Updated 8 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 4 years ago
- IDAPython plugin for Tensilica Xtensa (as seen in ESP8266), version 2☆36Feb 24, 2017Updated 9 years ago
- EDID (Enhanced Display Identification Data) Fuzzer☆19Nov 5, 2013Updated 12 years ago
- A way to force your wifi-pineapple to use SSL☆14Jul 26, 2017Updated 8 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Generate GSM authentication triplets (as per 3GPP TS 55.205)☆16Jan 11, 2018Updated 8 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- Home logging station☆12May 30, 2021Updated 4 years ago
- Board layout☆13Jul 1, 2015Updated 10 years ago
- Mini Stepper Motor with Android and Arduino☆18Aug 3, 2014Updated 11 years ago
- Files for the WI-Fi hacking workshop☆33Apr 18, 2020Updated 5 years ago
- Keep USB power banks alive when powering low-power projects with this pulsed constant current sink USB module.☆33Jun 30, 2024Updated last year
- AES GCM : Authenticated Encryption with Associated Data (AEAD) algorithm in Go language☆11Jan 5, 2016Updated 10 years ago