Efficient and advanced man in the middle framework

Xerosploit Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out
Information
Category: Python / Security related resources
Watchers: 125
Star: 1.6k
Fork: 581
Last update: Jan 20, 2022

Related Repos



jonathandata1 Mobile & IOT Malware, Spyware, & Forensic Analysis Author: Jonathan Scott Twitter: @jonathandata1 Version 1.0 This repository contains methods, and to
 

attakercyebr Program Features - ๐Ÿ“Œ Hack all Android phones. - ๐Ÿ“Œ Failure to detect antivirus. - ๐Ÿ“Œ Superior encryption - ๐Ÿ“Œ Source provided - ๐Ÿ“Œ 100 ูช FUD - ๐Ÿ“Œ It
 

Lujeni Volatile Fast and easy way to rollout on multiple GitLab project file a particular content. Why ? After looking for a tool to simply enforce a develop
 

kumarvicku ๐Ÿ…ผ๐Ÿ…ฐ๐Ÿ…ณ๐Ÿ…ด ๐Ÿ††๐Ÿ…ธ๐Ÿ†ƒ๐Ÿ…ท ๐Ÿ…ฟ ๐Ÿ†ˆ๐Ÿ†ƒ๐Ÿ…ท๐Ÿ…พ๐Ÿ…ฝ ๐Ÿ†… ๐Ÿ…ฟ ๐Ÿ…ท๐Ÿ…ธ๐Ÿ†‚๐Ÿ…ท๐Ÿ…ด๐Ÿ† [+] ๐•ฏ๐–Š๐–˜๐–ˆ๐–—๐–Ž๐–•๐–™๐–Ž๐–”๐–“ : Ultimate phishing tool ,A beginners friendly, Automated phishing tool
 

psiinon open-source-web-scanners A list of open source web security scanners on GitHub. General Purpose Web Scanners Main Site Last Commit Committers Stars Ar
 

vapen-hem This is a Password database I made for myself, as I want to keep all my passwords in the same place. but still protected, shall anyone get access to the file. And so I made this simple password database, that can encrypt, decrypt files, and generate Passwords, pin codes, and encryption keys. It took me about 4 - 6 months to make (Total I spent like 2 - 3 making it, but there were a lot of times where I did not work on the program) It is not 100% fine-tuned, but it works very well as is.
 

cert-ee Cuckoo 3 Cuckoo 3 is a Python 3 open source automated malware analysis system. For setup instructions, please refer to our documentation. This is a de
 

LetsDefend Phishing Email Analysis Useful tools MX Lookup Online URL/Attachment Analysis Tools AnyRun Browserling Hybrid Analysis urlscan Reputation Check Virust
 

izzitmichaela README This small script takes any decklist from an MTGO list and pulls all card images as jpg or png files into your directory. If you like this pr
 

Raiders0786 ClickJackPoc This tool will help you automate finding Clickjacking Vulnerability by just passing a file containing list of Targets . Once the Target i
 

elbee-cyber Hackerone Passive Recon Tool A passive-recon tool that parses through found assets and interacts with the Hackerone API. Setup Simply run setup.sh to
 

puzzlepeaches Log4jHorizon Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more. Crossing the Log4j Horizon - A Vulnerability With No Retu
 

jbaines-r7 Bad Blood Bad Blood is an exploit for CVE-2021-20038, a stack-based buffer overflow in the httpd binary of SMA-100 series systems using firmware versi
 

princep4 CLICK-Jack It is a automatic tool to find Clickjacking Vulnerability in various Web applications. What is Clickjacking ? Clickjacking, also known as a
 

Its-Vichy Discord-BotnetClient Embed C&C botnet into the discord client. Working trought websocket c&c server. How to use. pip3 install websocket_server colored