All Projects β†’ KevCui β†’ Mitm Scripts

KevCui / Mitm Scripts

Licence: mit
πŸ”„ A collection of mitmproxy inline scripts

Programming Languages

python
139335 projects - #7 most used programming language
script
160 projects

Projects that are alternatives of or similar to Mitm Scripts

Mockttp
Powerful friendly HTTP mock server & proxy
Stars: ✭ 346 (+217.43%)
Mutual labels:  proxy, testing-tools, mock-server
Mockserver Client Node
MockServer javascript client for browsers, Node.js or any grunt build
Stars: ✭ 52 (-52.29%)
Mutual labels:  proxy, mock-server
Wiremockui
Wiremock UI - Tool for creating mock servers, proxies servers and proxies servers with the option to save the data traffic from an existing API or Site.
Stars: ✭ 38 (-65.14%)
Mutual labels:  proxy, mock-server
Venom
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+1026.61%)
Mutual labels:  proxy, pentest-tool
Broxy
An HTTP/HTTPS intercept proxy written in Go.
Stars: ✭ 912 (+736.7%)
Mutual labels:  proxy, penetration-testing
Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+781.65%)
Mutual labels:  penetration-testing, pentest-tool
Proxify
Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
Stars: ✭ 1,153 (+957.8%)
Mutual labels:  proxy, mitmproxy
Lockdoor Framework
πŸ” Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+521.1%)
Mutual labels:  penetration-testing, pentest-tool
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-21.1%)
Mutual labels:  penetration-testing, pentest-tool
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-18.35%)
Mutual labels:  penetration-testing, pentest-tool
Proxy.py
⚑⚑⚑Fast, Lightweight, Pluggable, TLS interception capable proxy server focused on Network monitoring, controls & Application development, testing, debugging
Stars: ✭ 1,291 (+1084.4%)
Mutual labels:  proxy, mitmproxy
Babysploit
πŸ‘Ά BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+710.09%)
Mutual labels:  penetration-testing, pentest-tool
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+729.36%)
Mutual labels:  penetration-testing, pentest-tool
Eyes
πŸ‘€ πŸ–₯️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" πŸ” πŸ•΅οΈ
Stars: ✭ 38 (-65.14%)
Mutual labels:  penetration-testing, pentest-tool
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+600.92%)
Mutual labels:  penetration-testing, pentest-tool
Fuxi
Penetration Testing Platform
Stars: ✭ 1,103 (+911.93%)
Mutual labels:  penetration-testing, pentest-tool
Punk.py
unix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-1.83%)
Mutual labels:  penetration-testing, pentest-tool
Lyrebird
η§»εŠ¨εΊ”η”¨ζ’δ»ΆεŒ–ζ΅‹θ―•ε·₯作台
Stars: ✭ 663 (+508.26%)
Mutual labels:  proxy, testing-tools
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+6547.71%)
Mutual labels:  penetration-testing, pentest-tool
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+1055.05%)
Mutual labels:  penetration-testing, pentest-tool

mitm-scripts

A collection of some handy mitmproxy inline scripts.

Table of Contents

Precondition

  1. Install mitmproxy

  2. Configure client browser or device: configure proxy settings and install CA on client.

List of Scripts

All the scripts above can be used with mitmproxy and mitmdump command:

$ mitmproxy -s <script-name>.py

OR

$ mitmdump -s <script-name>.py

mitm-rewrite

./mitm-rewrite.py can return mock JSON response for certain target URLs.

  1. Run mitmdump:
$ mitmdump -s mitm-rewrite.py
  1. Check rewrite-router.yaml, to link response JSON file, for e.g:
http://example.com/pass: test_pass
http://example.com/fail: test_fail

It means that the response of "http://exmaple.com/pass" will be overwritten by the content in ./response/test_pass.json file and the response of "http://exmaple.com/fail" will be overwritten by the content in ./response/test_fail.json file.

  1. Edit response JSON file to put mock data you want:
{
  "status": 200,
  "header": { ... },
  "content": ...
}
  • status: http status code, an INT number
  • header: http response headers
  • content: response body

The changes in router yaml file and json response files will be applied on the fly, no need to restart proxy. Here is an example how it looks like:

mitm-rewrite-example

^ back to top ^


mitm-replace

./mitm-replace.py can replace the specific string to another one. replace-router.yaml is used to link URL and yaml file in response folder. In the response yaml file, the matching string and result strings can be defined as a pair. Don't forget to uncomment URLs in replace-router.yaml and make it work on the fly!

$ mitmdump -s mitm-replace.py

^ back to top ^


mitm-redirect-host

./mitm-redirect-host.py can redirect the request host of URL request to another host. The matching URL and redirect host can be defined in redirect-requenst.yaml. Attention: only the host part of request URL will be replaced.

$ mitmdump -s mitm-redirect-host.py

^ back to top ^


mitm-redirect-url

./mitm-redirect-url.py can redirect the whole request to another URL. The matching URL and redirect URL can be defined in redirect-request.yaml.

$ mitmdump -s mitm-redirect-url.py

^ back to top ^


mitm-delay-request

./mitm-delay-request.py can delay HTTP/HTTPS request time and response time, in order to simulate the slow network. To configure matching URL and delay time, edit delay-request.yaml.

$ mitmdump -s mitm-delay-request.py

^ back to top ^


mitm-kill-request

./mitm-kill-request.py can kill all matching requests. The matching request methods and URls can be defined in kill-request.yaml.

$ mitmdump -s mitm-kill-request.py

^ back to top ^


mitm-show-header

./mitm-show-header.py can print out matched request header and response header, with its value. The matching URL and header can be defined in show-header.yaml.

$ mitmdump -s mitm-show-header.py | grep '>>\|->'

^ back to top ^


mitm-check-analytics

./mitm-check-analytics.py can display real-time analytics key and value, in order to help checking analytics efficiently. To configure URL and keywords, edit check-analytics.yaml.

  1. Run mitmdump:
$ mitmdump -s mitm-check_analytics.py
  1. Visit target web page in clients: browsers or apps. The matched analytics keyword and value will show up in terminal.

^ back to top ^


mitm-dump-curl

./mitm-dump-curl can find matching request URL and dump the request to a file in as cURL format. The matching URL and dump folder can be defined in dump-curl.yaml.

$ mitmdump -s mitm-dump-curl.py

^ back to top ^


mitm-record

./mitm-record.py can save matching request details (request headers, request body, response headers and response body) to a specific file. The matching URl and dump folder can be defined in record-request.yaml.

$ mitmdump -s mitm-record.py

^ back to top ^


mitm-random-outage

./mitm-random-outage.py can simulate sever outage and return 503 code. It will pick randomly the requests to make it 503. The percentage of outage can be changed as the variable percentage inside the script.

$ mitmdump -s mitm-random-outage.py

^ back to top ^


Buy Me A Coffee

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].