All Projects → xdavidhu → Mitmap

xdavidhu / Mitmap

Licence: mit
📡 A python program to create a fake AP and sniff data.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Mitmap

Wifi Pumpkin Deprecated
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
Stars: ✭ 2,964 (+94.23%)
Mutual labels:  wifi, wireless, hacking, mitm, access-point
Wirespy
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Stars: ✭ 293 (-80.8%)
Mutual labels:  wifi, wireless, pentesting, mitm
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-66.64%)
Mutual labels:  hacking, pentesting, infosec
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+267.96%)
Mutual labels:  hacking, pentesting, infosec
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+374.84%)
Mutual labels:  hacking, pentesting, infosec
Nmap
Idiomatic nmap library for go developers
Stars: ✭ 391 (-74.38%)
Mutual labels:  hacking, pentesting, infosec
Apkurlgrep
Extract endpoints from APK files
Stars: ✭ 405 (-73.46%)
Mutual labels:  hacking, pentesting, infosec
Bettercap
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Stars: ✭ 10,735 (+603.47%)
Mutual labels:  wifi, hacking, mitm
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (-42.99%)
Mutual labels:  hacking, pentesting, infosec
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+488.53%)
Mutual labels:  kali-linux, hacking, pentesting
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-93.12%)
Mutual labels:  hacking, pentesting, infosec
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+172.74%)
Mutual labels:  hacking, pentesting, infosec
Airgeddon
This is a multi-use bash script for Linux systems to audit wireless networks.
Stars: ✭ 3,830 (+150.98%)
Mutual labels:  wireless, hacking, pentesting
Ehtools
Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
Stars: ✭ 422 (-72.35%)
Mutual labels:  kali-linux, hacking, pentesting
Hetty
Hetty is an HTTP toolkit for security research.
Stars: ✭ 3,596 (+135.65%)
Mutual labels:  pentesting, infosec, mitm
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-63.56%)
Mutual labels:  hacking, pentesting, infosec
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-25.56%)
Mutual labels:  hacking, pentesting, infosec
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+129.55%)
Mutual labels:  kali-linux, hacking, pentesting
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-49.21%)
Mutual labels:  hacking, pentesting, infosec
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-95.94%)
Mutual labels:  hacking, pentesting, infosec
           _ _              ___  ______
          (_) |            / _ \ | ___ \
 _ __ ___  _| |_ _ __ ___ / /_\ \| |_/ /
| '_ ` _ \| | __| '_ ` _ \|  _  ||  __/
| | | | | | | |_| | | | | | | | || |    
|_| |_| |_|_|\__|_| |_| |_\_| |_/\_| 2.2

⚠️ Warning! This project is no longer maintained and may not work as excepted.

A python program to create a fake AP and sniff data.

new in 2.0:

  • SSLstrip2 for HSTS bypass
  • Image capture with Driftnet
  • TShark for command line .pcap capture

features:

  • SSLstrip2
  • Driftnet
  • Tshark
  • Full featured access point, with configurable speed limit
  • mitmproxy
  • Wireshark
  • DNS Spoofing
  • Saving results to file

requirements:

Kali Linux / Raspbian with root privileges
A wireless card and an ethernet adapter / 2 wireless card
Python3 (mitmAP will install the dependenices, you don't have to do it)

downloading:

"git clone https://github.com/xdavidhu/mitmAP"

starting:

  • Kali Linux -> "sudo python3 mitmAP.py"
  • Raspberry PI -> "sudo python3 mitmAP_rpi.py"

Important: At the first run, choose 'y' on installing dependencies and on creating the config files!

disclaimer:

I'm not responsible for anything you do with this program, so please only use it for good and educational purposes.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].