Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security man in the middle
man-in-the-middle
x
security
x
5 search results found
Mitmproxy
⭐
33,419
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
Bettercap
⭐
15,224
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Nogotofail
⭐
2,681
An on-path blackbox network traffic security testing tool
Badssl.com
⭐
2,594
🔒 Memorable site for testing clients against bad SSL configs.
Wifipumpkin3
⭐
1,653
Powerful framework for rogue access point attack.
Pyrdp
⭐
1,427
RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact
Seth
⭐
1,358
Perform a MitM attack and extract clear text credentials from RDP connections
Ssh Mitm
⭐
1,176
SSH-MITM - ssh audits made simple
Evilgrade
⭐
1,132
Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.
Hackdroid
⭐
753
Pentesting Using Android
Waf
⭐
643
🚦Web Application Firewall or API Gateway(应用防火墙/API网关)
Raven Storm
⭐
475
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Littleproxy Mitm
⭐
209
Man-In-The-Middle extension for LittleProxy
Xepor
⭐
194
Xepor, a web routing framework for reverse engineers and security researchers, brings the best of mitmproxy & Flask
Striptls
⭐
164
proxy poc implementation of STARTTLS stripping attacks
Prism Ap
⭐
161
An automated Wireless RogueAP MITM attack framework.
Wirebug
⭐
142
WireBug is a toolset for Voice-over-IP penetration testing
Tls Redirection
⭐
102
TLS Redirection
Hyenae Ng
⭐
99
Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, pattern based address randomization and flood detection breaking mechanisms.
Petep
⭐
95
PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is a useful tool for performing penetration tests of applications with various application protocols. ⚡
Dns Mitm
⭐
80
A minimal DNS service that can provide spoofed replies
Dsploit Scripts
⭐
42
Scripts that could be injected in MITM attacks using dSploit
Arppd
⭐
35
An ARP Poisoning Defender script
Mitm
⭐
29
A simple yet effective python3 script to perform DNS spoofing via ARP poisoning
Ratched
⭐
28
Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing
Http Headers
⭐
20
🔒 HTTP Headers for Wordpress
Laravel Encrypted Api
⭐
14
Encrypted API communication between Laravel applications
Ffssdp Mitm
⭐
11
The SSDP engine in Firefox for Android (68.11.0 and below) can be tricked into triggering Android intent URIs with zero user interaction.
Malignproxy
⭐
9
HTTP proxy for web security auditing
Alpnpass
⭐
6
This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffic again and send it to the target of your choice. Unlike most SSL stripping solutions this tool will negotiate ALPN and preserve the negotiated protocol all the way to the target.
Network Security
⭐
5
CS6740 Spring 2016 Network Security Class Codes
Aegis
⭐
5
MITM protection for MacOS
Related Searches
Security Vulnerabilities (11,840)
Laravel Security (11,580)
Php Security (10,611)
Java Security (2,568)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
1-5 of 5 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.