A simple program that intercepts HTTPs traffic using Netty and BouncyCastle
-
Updated
Mar 11, 2024 - Java
A simple program that intercepts HTTPs traffic using Netty and BouncyCastle
This work is a part of a winter project in IISER Pune, December 2019.
The man-in-the-middle toolkit
IPv6 attack toolkit
🛡️📃 PhoenixDOMString 🚀 🔏📃SAMkenXEcosystem📃Home repository for .NET Core
This is the simulation of Man In The Middle Attack in Diffie Hellman Public Key algorithm.
Make a Fake wireless access point aka Evil Twin....Easily!!
ARP Poisoning/Spoofing using Scapy Python Library
👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.
Evil little Snitch that can be used for good or evil
The rogue Access Point framework for achieving a MITM (Man-in-the-Middle) position against wireless clients by performing targeted Wi-Fi association attacks or to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. 3rd party login pages or WPA/WPA2 Pre-Shared Keys)
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
ARP spoofing program written in C.
Python script for arp poisoning/spoofing man-in-the-middle attack using Scapy
Automated bash file used to sniff http requests on a router using the concept of 'Man in the middle' attack by performing an 'ARP(Address Resolution Protocol) poisoning'. Tools used: WireShark, nmap , ettercap
Implementation of some scenarios of man-in-the-middle attack & pharming attack.
Rust port of MITM attack on 2PRESENT24.
This repo will contain the algorithms for encryption and decryption of messages and ciphers respectively !!
Simple script to automate ARP spoofing attack
Add a description, image, and links to the man-in-the-middle-attack topic page so that developers can more easily learn about it.
To associate your repository with the man-in-the-middle-attack topic, visit your repo's landing page and select "manage topics."