man-in-the-middle-attack
There are 43 repositories under man-in-the-middle-attack topic.
jtesta/ssh-mitm
SSH man-in-the-middle tool
vanhauser-thc/thc-ipv6
IPv6 attack toolkit
aress31/wirespy
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
vrikodar/Rudrastra
Make a Fake wireless access point aka Evil Twin....Easily!!
mvondracek/wifimitm
Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks
Abhiramborige/Crypto-systems
This repo will contain the algorithms for encryption and decryption of messages and ciphers respectively !!
The-Assembly/Intro-to-Ethical-Hacking
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
kbs1/laravel-encrypted-api
Encrypted API communication between Laravel applications
crcarlo/arp-spoofing-python
A script for sniffing internet traffic between a machine and the gateway in your local network.
d3v4s/mitmoxy
😈 HTTP/HTTPS python proxy server for man-in-the-middle attack 😈
RobertJonnyTiger/Endpoint-Detection-and-Response
Python EDR system Example (server and client-side)
KMiNT21/binaryplant-arp-defender
BintaryPlant.com - ARP Defender
n0nexist/Trafficante
The man-in-the-middle toolkit
AzizKpln/FILEINTERCEPTOR
This Program Replaces Files With The Files You Want.
francomano/man-in-the-middle-python
ARP Poisoning/Spoofing using Scapy Python Library
HQarroum/arp-spoofer
👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.
JoseAngelMartinB/Man_in_the_middle
Man in the middle attack demo
SkyN9ne/wifiphisher
The rogue Access Point framework for achieving a MITM (Man-in-the-Middle) position against wireless clients by performing targeted Wi-Fi association attacks or to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. 3rd party login pages or WPA/WPA2 Pre-Shared Keys)
Ananyapam7/Exploring-Blockchain-and-Cryptocurrency
This work is a part of a winter project in IISER Pune, December 2019.
garghub/Encryption-Decryption-ManInTheMiddle
Python project(s)
lucasvmx/larp
Simple script to automate ARP spoofing attack
cgreen18/Cybersecurity-TinyOS-Encryption
Final project for Fundamentals of Cybersecurity
siddh1234/subterfuge
Framework - man in the middle attack
BenjiTrapp/golden-snitch
Evil little Snitch that can be used for good or evil
danthe1st/HTTPs-intercept
A simple program that intercepts HTTPs traffic using Netty and BouncyCastle
kbmclaren/lab3-CMSC426-CmpSec
This lab required the group to compromise mutual authentication between two parties via two techniques: an ARP cache poisoning and a Man-In-the-Middle Attack.
aditya2922/DAN_Project_Exibition1
DAN (Detection of Analog-based Network attacks) is an advanced plug-and-play Man-in-the-Middle (MitM) detector designed for local area networks, utilizing ICMP echo requests and machine learning to accurately identify and profile network hosts, making it resilient against adversarial attacks.
hackhunt/arp-spoofer
ARP Spoofer is free open source tool which can be use to do Man in the Middle Attacks
hy-qqqqq/mitm_pharm_attack
Implementation of some scenarios of man-in-the-middle attack & pharming attack.
IlyasKadi/Attaques-actives
Une attaque active, en matière de sécurité informatique, est une attaque caractérisée par l'attaquant qui tente de s'introduire dans le système. Lors d'une attaque active, l'intrus peut introduire des données dans le système ainsi que potentiellement modifier des données au sein du système.
yukioichida/ospf-router
A OSPF virtual router that allows injecting false routes, creating a backdoor in a network.
Ashwin-Dev-P/http-sniffing
Automated bash file used to sniff http requests on a router using the concept of 'Man in the middle' attack by performing an 'ARP(Address Resolution Protocol) poisoning'. Tools used: WireShark, nmap , ettercap
GowthamBabu25/Man-In-The-Middle-Attack-Simulation
This is the simulation of Man In The Middle Attack in Diffie Hellman Public Key algorithm.
samkenxstream/SAMkenxdotnet-core
🛡️📃 PhoenixDOMString 🚀 🔏📃SAMkenXEcosystem📃Home repository for .NET Core