An open API service indexing awesome lists of open source software.

Projects in Awesome Lists tagged with mitm-attacks

A curated list of projects in awesome lists tagged with mitm-attacks .

https://github.com/koutto/pi-pwnbox-rogueap

Homemade Pwnbox :rocket: / Rogue AP :satellite: based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap :bulb:

cheatsheet hacking hacking-cheasheet hacking-tools mindmap mitm-attacks pwnbox raspberry-pi red-team rogueap wifi wifi-hacking wifi-security

Last synced: 15 May 2025

https://github.com/secretsquirrel/bdfproxy

Patch Binaries via MITM: BackdoorFactory + mitmProxy.

bdf bdfproxy mitm mitm-attacks mitmproxy python

Last synced: 16 May 2025

https://github.com/secretsquirrel/BDFProxy

Patch Binaries via MITM: BackdoorFactory + mitmProxy.

bdf bdfproxy mitm mitm-attacks mitmproxy python

Last synced: 02 Dec 2024

https://github.com/sab0tag3d/mitm-cheatsheet

All MITM attacks in one place.

cheatsheet mitm mitm-attacks pentesting

Last synced: 31 Dec 2024

https://github.com/frostbits-security/MITM-cheatsheet

All MITM attacks in one place.

cheatsheet mitm mitm-attacks pentesting

Last synced: 02 Apr 2025

https://github.com/r00t-3xp10it/morpheus

Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)

ettercap metasploit mitm-attacks on-the-fly tcp-udp-manipulation

Last synced: 05 Mar 2025

https://github.com/r3li4nt/road-to-hacking

¿Quieres empezar en el mundo hacking? En esta revista te enseño a instalar Kali Linux desde cero y a manipular herramientas esenciales en el Hacking Ético.

cracking ebook espanol esteganografia exploit hacking hash kali-linux mitm mitm-attacks payload penetration-testing pentesting phishing privilege-escalation redes sniffing tor web wireless

Last synced: 26 Mar 2025

https://github.com/emreovunc/arp-poisoning-tool

ARP Poisoning Tool, it creates entries on target's ARP Table. The things which you need only are Destination IP and MAC address.

arp-poisoning arp-spoofing mitm-attacks mitmf python-arp python-arppoisoning python-arpspoofing

Last synced: 20 Nov 2024

https://github.com/keenrivals/bugsite-index

Index of websites publishing bugs along the lines of heartbleed.com

heartbleed mitm-attacks netsec security ssl tls

Last synced: 13 May 2025

https://github.com/imgp3dev/drmitm

DrMITM is a program designed to globally log all traffic of a website.

ip mitm mitm-attacks network nim nim-lang pentesting python traffic

Last synced: 20 Nov 2024

https://github.com/srjanel/arp_poisoning

Arp Poisoning tool in C using raw sockets

arp-poisoning c mitm-attacks raw-sockets

Last synced: 20 Nov 2024

https://github.com/8tiqa/vpn-security-analysis

Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN (using ARPspoof, chap2asleap, CUPP2 and ASLEAP) | In-depth research of IPv6 Leakage and DNS Hijacking i

arpspoof asleap chap2asleap cupp2 dns-hijacking ike-scan ipsec ipv6-leakage kali-linux mitm-attacks penetration-testing pptp vpn vpn-security-analysis

Last synced: 20 Nov 2024

https://github.com/arvahedi/gl4dius

A very powerful tool for All kind of MITM attacks

deface defacement hackers iptables mitm-attacks sniffer sniffing sslstrip

Last synced: 20 Nov 2024

https://github.com/utsanjan/ffssdp-mitm

The SSDP engine in Firefox for Android (68.11.0 and below) can be tricked into triggering Android intent URIs with zero user interaction.

android android-intent-uri ffssdp firefox firefox-application intent-triggering lan maninthemiddle maninthemiddleattack mitm mitm-attacks newest security ssdp-engine vulnerability wifi-network

Last synced: 22 Nov 2024

https://github.com/b4dnewz/keylog.io

An express/socketio keylogger server with administrator interface

administration-interface angular express keylog keylogger keylogger-analysis mitm-attacks socket-io socketio

Last synced: 04 May 2025

https://github.com/danngalann/arpdos

A python script to DoS / MITM every device on the network (except yourself ;))

dos-attack ethernet ethical-hacking hacking mitm mitm-attacks network pentesting

Last synced: 20 Nov 2024

https://github.com/keygen-sh/example-node-response-signature-verification

An example implementation of verifying response signatures using cryptography to prevent tampering with cache payloads, replay attacks and MITM attacks.

code-sample ed25519 keygen license-keys licensing mitm-attacks platform-example rsa-cryptography software-licensing

Last synced: 20 Nov 2024

https://github.com/keygen-sh/example-signature-verification

An example implementation of verifying response signatures using cryptography to prevent tampering with cache payloads, replay attacks and MITM attacks.

code-sample ed25519 keygen license-keys licensing mitm-attacks platform-example rsa-cryptography software-licensing

Last synced: 15 Dec 2024

https://github.com/samay825/insta-reseter

This tool named "InSta-Reseter" is mainly use to reset the Instagram Account Secure Accounts , All working apis are present in the script , If you do any illegal activites through this script we are not responsible

email-parsing hackingtools mitm-attacks reset-instagram-password reset-password sincryption sms-client termux termux-hacking termux-tool

Last synced: 18 Feb 2025

https://github.com/bioverflow/injectionpoint

MiTM attack to inject JS code in a public WiFi hotspot, initially to cryptocurrency

hotspot-wifi injection-attacks mitm-attacks

Last synced: 20 Nov 2024

https://github.com/abhinandan-khurana/arp_spoofer

This is a Python based command line ARP Spoofer utility, which takes input as arguments for the exact target IP and gateway IP for which you wish to Spoof ARP request.

cybersecurity mitm mitm-attacks mitm-framework python3 tools

Last synced: 27 Feb 2025

https://github.com/abhinandan-khurana/mac_address_spoofer

This is a Python based command line MAC Address Spoofer utility for LINUX systems, which takes input as an argument for the exact interface you wish to modify the MAC Address for and changes the MAC Address.

cybersecurity mac mitm mitm-attacks mitm-framework tools

Last synced: 27 Feb 2025

https://github.com/abhinandan-khurana/simple-packet-sniffer

This is a command line packet scanner utility for Windows based on Python. When in a network, you can use this to sniff http packets for leaked usernames and passwords, thereby performing MITM.

cyber-security mitm mitm-attacks mitm-framework mitmproxy python tools

Last synced: 27 Feb 2025

https://github.com/airvzxf/hack-pwn-adventure-3

This video game was created to test the hackers. I'm trying to solve it applying the technic "Man In The Middle Attack". I took some ideas and resources from LiveOverflow/PwnAdventure3 (https://github.com/LiveOverflow/PwnAdventure3) but I am doing with my thoughts and resources.

hack hacking mitm mitm-attacks proxy pwnadventure3 transparent-proxy

Last synced: 27 Jan 2025

https://github.com/hadi77ir/nativemessagingproxy

Simple proxy for Native Messaging Hosts in Chrome extensions, allowing for executing MITM on them

chrome-extension chrome-native-messaging mitm mitm-attacks mitmproxy native-messaging native-messaging-host

Last synced: 08 Apr 2025

https://github.com/priyabug/icmp-redirect-attack-lab

Demonstrates the execution and impact of an ICMP Redirect Attack, focusing on how attackers can manipulate routing to hijack network traffic.

icmp icmp-redirect ip-protocol mitm-attacks python3 redirection routing show-ip-route ubuntu windows11

Last synced: 22 Feb 2025

https://github.com/oliverwebdev/hammerofgod

🔨 HAMMER OF THE GODS 🔨 - An advanced network toolkit for security professionals and network administrators. Featuring comprehensive IPv4/IPv6 scanning, ARP/ND spoofing, security testing, and network manipulation capabilities. Built for authorized security assessments with artistic terminal output and detailed logging. Educational purposes only!

arp-spoofing cybersecurity ethical-hacking ipv6-security mitm-attacks network-scanner network-security penetration-testing python-security scapy security-tools

Last synced: 22 Mar 2025

https://github.com/priyabug/implemented-arp-cache-manipulation-to-identify-and-analyze-network-vulnerabilities.

This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study their impact, and implement countermeasures.

arp mitm-attacks scapy sniffing-spoofing

Last synced: 15 Mar 2025