Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/arvahedi/gl4dius
A very powerful tool for All kind of MITM attacks
https://github.com/arvahedi/gl4dius
deface defacement hackers iptables mitm-attacks sniffer sniffing sslstrip
Last synced: 22 days ago
JSON representation
A very powerful tool for All kind of MITM attacks
- Host: GitHub
- URL: https://github.com/arvahedi/gl4dius
- Owner: arVahedi
- License: gpl-3.0
- Created: 2017-09-04T07:56:17.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-09-07T10:23:45.000Z (over 1 year ago)
- Last Synced: 2024-08-05T09:16:10.404Z (4 months ago)
- Topics: deface, defacement, hackers, iptables, mitm-attacks, sniffer, sniffing, sslstrip
- Language: Java
- Size: 714 KB
- Stars: 15
- Watchers: 1
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-network-stuff - **6**星
README
# Gl4dius
#### (Powered by Gl4di4tor)
A very powerful tool for All kinds of MITM attacks.![Alt Gl4dius](./icon.png)
## **ATTENTION:** We are currently working on version 2 which is based on Spring-Shell to be more user-friendly and easy to use. So the master branch might seem empty, but to view the code of version 1.0 please follow this link: [archive/version_1.0](https://github.com/arVahedi/Gl4dius/releases/tag/archive%2Fversion_1.0)
## Features :
- Deface attack on the whole LAN network
- Phishing attack
- Sniffing attack
- SSL downgrade attack (**SSL-Stripping**)
- Bypass **HSTS** protection
- Cover your track from discovery methods automatically. (**Be Careful**: No guarantee that you will be
invisible completely. A hacker who understands MITM attacks deeply can still hunt you. But it will be very difficult for normal
people or script kiddies to track you.)**Note:** If you are a script kiddie please don't try to use this tool. Anyway, it will not work for you. (I guarantee that!)
## Dependencies :
- iptables or pf (iptables is recommended)
- jre >= 1.8## How to use :
Use the config file for configuring the tool, and select the kind of attack and other properties.
after that, you can simply run the tool like other Java programs.(I wrote imperfect documentation deliberately, to prevent script kiddies from using this tool.
If you are a grand master hacker accept my apologies, Of course, you can use this tool with little R&D.)## Contact me :
For report bugs and suggestion features add issues or contact me via [email protected]
## License
[GNU GENERAL PUBLIC LICENSE Version 3](https://www.gnu.org/licenses/gpl.html)