67 results for “topic:man-in-the-middle-attack”
SSH man-in-the-middle tool
IPv6 attack toolkit
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Make a Fake wireless access point aka Evil Twin....Easily!!
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
This repo will contain the algorithms for encryption and decryption of messages and ciphers respectively !!
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
A tool to perform man-in-the-middle attacks with arp-spoofing on rooted Android devices
Encrypted API communication between Laravel applications
Python EDR system Example (server and client-side)
A script for sniffing internet traffic between a machine and the gateway in your local network.
😈 HTTP/HTTPS python proxy server for man-in-the-middle attack 😈
BintaryPlant.com - ARP Defender
👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.
Man in the middle attack demo
ARP Poisoning/Spoofing using Scapy Python Library
Cybersecurity Threats & Vulnerabilities Guide is a comprehensive educational resource that provides detailed documentation, detection scripts, and prevention strategies for various cybersecurity threats.
The man-in-the-middle toolkit
This Program Replaces Files With The Files You Want.
This work is a part of a winter project in IISER Pune, December 2019.
A simple program that intercepts HTTPs traffic using Netty and BouncyCastle
Evil little Snitch that can be used for good or evil
Simple script to automate ARP spoofing attack
No description provided.
Python project(s)
🗂️ Memory-map large files efficiently with this cross-platform Zig library, featuring zero-copy access and simple API for seamless data handling.
Final project for Fundamentals of Cybersecurity
No description provided.
This lab required the group to compromise mutual authentication between two parties via two techniques: an ARP cache poisoning and a Man-In-the-Middle Attack.
Recon tools, MITM tools and malwares written in python for penetration testing -- for education purposes only!