|Project Name||Stars||Downloads||Repos Using This||Packages Using This||Most Recent Commit||Total Releases||Latest Release||Open Issues||License||Language|
|Sslstrip||1,455||5 years ago||20||gpl-3.0||Python|
|A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.|
|Dheater||156||3 months ago||13||November 14, 2023||2||apache-2.0||Python|
|D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)|
|Sslcertificatechecker Phonegap Plugin||147||3||7||5 years ago||4||May 22, 2018||25||mit||Objective-C|
|:passport_control: Prevent Man in the Middle attacks with this Cordova plugin|
|Tls Redirection||102||6 years ago|
|Poodle||74||8 years ago||1||gpl-2.0||Python|
|A Proof of Concept for the POODLE vulnerability in SSLv3|
|Cryptanalysis||45||3 years ago|
|This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges|
|Awesome Tls Hacks||42||3 months ago||cc0-1.0|
|A collection of SSL/TLS security related resources.|
|Awesome Tls Security||35||a year ago||TeX|
|A collection of (not-so, yet) awesome resources related to TLS, PKI and related stuff|
|Ratched||28||2 years ago||3||C|
|Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing|
|Sidh Writeup||26||7 years ago||C|
|Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"|
sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks.
It requires Python 2.5 or newer, along with the 'twisted' python module.
Installing: * Unpack: tar zxvf sslstrip-0.5.tar.gz * Install twisted: sudo apt-get install python-twisted-web * (Optionally) run 'python setup.py install' as root to install, or you can just run it out of the directory.
sslstrip can be run from the source base without installation.
Just run 'python sslstrip.py -h' as a non-root user to get the command-line options.
The four steps to getting this working (assuming you're running Linux) are: 1) Flip your machine into forwarding mode (as root): echo "1" > /proc/sys/net/ipv4/ip_forward 2) Setup iptables to intercept HTTP requests (as root): iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <yourListenPort> 3) Run sslstrip with the command-line options you'd like (see above). 4) Run arpspoof to redirect traffic to your machine (as root): arpspoof -i <yourNetworkdDevice> -t <yourTarget> <theRoutersIpAddress>