Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for man in the middle
man-in-the-middle
x
407 search results found
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Compy
⭐
167
HTTP/HTTPS compression proxy
Cuwo
⭐
166
Open server and utilities for Cube World
Striptls
⭐
164
proxy poc implementation of STARTTLS stripping attacks
Prism Ap
⭐
161
An automated Wireless RogueAP MITM attack framework.
Dilettante
⭐
159
Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.
Mitmonster
⭐
159
A monster cheatsheet on MITM attacks
Sshhipot
⭐
151
High-interaction MitM SSH honeypot
Amiiswap
⭐
149
Nintendo Switch GUI Amiibo Manager homebrew for emulation with Emuiibo (nfp mitm)
Pipe Intercept
⭐
143
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
Wirebug
⭐
142
WireBug is a toolset for Voice-over-IP penetration testing
Bereal
⭐
136
How does BeReal work (Under the hood)
Snifflab
⭐
133
Scripts to create your own MITM'ing, packet sniffing WiFi access point
Archisteamfarm Install Script
⭐
130
Help you quickly install ASF on VPS. 帮助你快速地把ASF安装在VPS上面。Now support Raspberry Pi 2/3
Xxelab
⭐
130
A simple web app with a XXE vulnerability.
Raw Packet
⭐
122
Raw-packet Project
Creak
⭐
121
Poison, reset, spoof, redirect MITM script
Aimsicdl
⭐
120
AIMSICD Lite (Android IMSI-Catcher Detector) - reloaded!
Android Ssl Pinning Bypass
⭐
119
The script allows to bypass SSL pinning on Android >= 7 and makes APK file ready for HTTPS traffic inspection
Pokemon Go Xposed
⭐
119
📱 Xposed module for Pokemon Go - Circumvents the certificate pinning by injecting the expected SSL trust chain, allows you to MITM and to configure a custom API endpoint.
Ctraspion
⭐
119
Turns a Raspberry Pi into a WLAN router to take a look at network traffic of smart home and IoT devices
Mitm
⭐
108
👨🏼💻 A customizable man-in-the-middle TCP intercepting proxy.
Copycat
⭐
106
Universal MITM web server
Usb Proxy
⭐
104
A USB proxy based on raw-gadget and libusb
Tls Redirection
⭐
102
TLS Redirection
Hyenae Ng
⭐
99
Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms.
Service Identity
⭐
95
Service Identity Verification for Python
Petep
⭐
95
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
Node Mitm Proxy
⭐
94
Node.js Man-in-the-middle http and https proxy
Pyehviewer
⭐
94
iOS端 exhentai.org 阅读方案
Mitm Adblock
⭐
92
A fast adblocking proxy server (which works on HTTPS connections)
Pentest
⭐
88
Custom tools and projects about security
Articulos
⭐
88
Artículos relacionados a la Ciberseguridad y Hacking.
Reverse Engineering Bluetooth Protocols
⭐
86
Intercepting Bluetooth device communication and simulating packet responses of an iPhone from a Raspberry Pi 3
Krack Poc
⭐
84
Krack POC
Hid Mitm
⭐
83
Sysmodule mitming the Horizon hid (human interface device) services to allow using unsupported gamepads on the nintendo switch.
Mps
⭐
82
MPS is a high-performance HTTP(S) proxy library that supports forward proxies, reverse proxies, man-in-the-middle proxies, tunnel proxies, Websocket proxies. MPS 是一个高性能HTTP(s)中间代理库,它支持正向代理、反向代理、中间人代理、隧道代理、Websock
Dns Mitm
⭐
80
A minimal DNS service that can provide spoofed replies
Weixin Spider
⭐
79
《微信公众号采集系统》微信公众号文章的阅读数、在看数、评论数、评论列表,还有微信公众号的账号基本信息
Mitm Omegle
⭐
78
Watch strangers talk on Omegle (man in the middle attack)
Tiktok Free
⭐
75
TiKTok 地区自由切换(封区解锁)和去水印。小火箭的配置 shadowroket 。Unlock region limit& Removed the watermark when downloading.
Switch Sys Tweak
⭐
74
A collection of miscellaneous mitms that may eventually grow as stuff gets added.
Poodle
⭐
74
A Proof of Concept for the POODLE vulnerability in SSLv3
Cute Proxy
⭐
74
A Man-In-The-Middle Proxy as Fiddle and Charles, using Netty, JavaFX
Autorelay
⭐
71
Automatically performs the SMB relay attack
My Forensics
⭐
68
Digital Forensics and Incident Response (DFIR)
G Earth
⭐
66
Cross-platform Habbo packet manipulator
Docker Squid4
⭐
65
Squid 4 docker container
Netool Toolkit
⭐
65
MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --
Iot Pentest Devices And Purpose
⭐
61
Proxydroid
⭐
61
编译版https://github.com/madeye/proxydroid
N4p
⭐
59
Offensives network security framework for Wireless and MiTM style hacking
Wifi Pumpkin V3.0
⭐
57
Advance mitm attack using fake access point
Esp Bug
⭐
57
ESP8266 based WiFi implant to remotely track the presence of certain people or devices via a simple web interface
Passivescan
⭐
56
PassiveScan-被动扫描之巅
Httransform
⭐
54
A framework to build precise and fast HTTP proxies.
Haxxmap
⭐
53
Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.
Allproxy
⭐
50
MITM debugging proxy: HTTPS, MongoDB, Redis, MySQL and gRPC. Also makes JSON logs human readable.
Wilma
⭐
50
Service Virtualization Solution – a combined Service Stub and Transparent Proxy
Ringleader
⭐
48
A tool for configuring and using MITM proxies from firefox
Boltconn
⭐
47
Privacy-oriented proxy & network manager, supporting WireGuard, L7 firewall and scripted MitM.
Smithproxy
⭐
45
featured transparent tcp/udp/ssl proxy
Starttls Mitm
⭐
44
A starttls-capable transparent man-in-the-middle proxy
Oneforallfacebook
⭐
42
Modified patch of https://github.com/Naituw/HackingFacebook/ and https://github.com/Naituw/IPAPatch/
Man In The Middle
⭐
42
Modify requests, inject JavaScript and CSS into pages
Phishlets
⭐
42
Phishlets for Evilginx2 (MITM proxy Framework)
Dsploit Scripts
⭐
42
Scripts that could be injected in MITM attacks using dSploit
Android Security Guides
⭐
41
Netflix Mitm Proxy
⭐
41
A tool for analyzing Netflix MSL API
Fluxzy.core
⭐
40
Fully managed and fully streamed Man-On-The-Middle engine and a CLI app to intercept, record and alter HTTP/1.1, H2, websocket traffic over plain or secure channels.
Aicdm
⭐
38
AICDL collector services and modules
Bitb Phishing
⭐
37
Browser In The Browser (BITB) attack is a sophisticated phishing and hard to detect.
Phishpond
⭐
37
Because phishtank was taken.. explore phishing kits in a contained environment!
Thegreatfilter
⭐
36
An ajax interceptor chrome extension allow the user to filter and modify API response
React Native Ble Peripheral
⭐
35
a simulator for a BLE peripheral, to help with testing BLE apps without an actual peripheral BLE device
Cooperpair
⭐
35
PGPv4 long key-id collision test-cases; MitM keyserver PoC; script to safely import keys from keyservers
Arppd
⭐
35
An ARP Poisoning Defender script
Postgres Mitm
⭐
34
Test whether your Postgres connections are vulnerable to MitM attacks
Dit
⭐
33
DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supports psk-based and certificate-based authentication schemes (RSA + ECC).
Etherwall
⭐
33
Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DNS Spoofing, DHCP Spoofing, and others.
Etherweasel
⭐
32
Hardware and software for a man-in-the-middle DNS cache poisoning attack on an Ethernet network
Third Wheel
⭐
32
A rust implementation of a man-in-the-middle proxy
Wifimitm
⭐
32
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Mitm Detector
⭐
32
Man in the middle detection tools
Addjsif
⭐
32
Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)
M3u8_dl
⭐
32
m3_dl support encrpt key , support Mac/windows
Rudrastra
⭐
31
Make a Fake wireless access point aka Evil Twin....Easily!!
Refluxion
⭐
31
Refluxion -- MITM WPA attacks tool
Surge
⭐
31
按照lhie1规则 并且加入节点 持续更新
Mitm Helper Wifi
⭐
31
WiFi MITM Helper
Py
⭐
31
rsa,base64,ac,kmp,svm,knn,mitm,hash table... 🚀
Mitmproxy Node
⭐
30
A bridge between Python's mitmproxy and Node.JS programs. Rewrite network requests using Node.JS!
Userscript Proxy
⭐
30
Browser extensions on any device
Defcon 23 Presentation
⭐
30
USB Attack to Decrypt Wi-Fi Communications
Drmitm
⭐
29
DrMITM is a program designed to globally log all traffic of a website.
Mitm
⭐
29
A simple yet effective python3 script to perform DNS spoofing via ARP poisoning
Ratched
⭐
28
Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing
Cloudproxy
⭐
28
A MITM proxy for instrumenting HTTP/S traffic
Ewbf Dev Fee To Mywallet
⭐
27
No fee EWBF Miner with node js
Iyov
⭐
27
Web proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
101-200 of 407 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.