SSH-MITM - ssh audits made simple
-
Updated
Nov 10, 2025 - Python
SSH-MITM - ssh audits made simple
RTDS is a cutting-edge, lightweight cybersecurity simulation and detection framework designed for real-time network threat analysis. Built with modern Python architecture, it provides comprehensive monitoring capabilities for detecting sophisticated cyber attacks in live network environments.
Automated evil twin access point toolkit with traffic capture and real-time monitoring for wireless penetration testing and security research.
Retrieve server certificate data from transparency logs or APIs and compare it to certs we know we have.
Comprehensive guide and tools for packet sniffing and network traffic analysis. Educational purpose only. For ethical hackers and network administrators.
Icinga/Nagios and stand-alone check scripts for the heuristic testing of machine-in-the-middle situations.
A USB proxy based on raw-gadget and libusb
此程序用于gsm中间人攻击中的mobile(攻击手机)端#GSM MITM#gsm中间人攻击#osmocombb#gsm#
Simple integrated proxy to perform Man-in-the-Middle over TCP
kdai(Kernel Dynamic ARP Inspection) is a linux kernel module to defend against arp cache poisoning
The Internet Control Message Protocol (ICMP) is an integral part of the IP suite used for sending error messages and operational information. Commonly used by tools like ping and traceroute, ICMP helps diagnose network issues by reporting unreachable hosts, time exceeded errors, and route changes.
WFP Transparent Proxy
WFP Endpoint Protection Traffic Blocker
This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study their impact, and implement countermeasures.
This Python script generates a custom dictionary for brute-force Wi-Fi password cracking by combining words, numbers, and special characters, and outputs the permutations to a file for use in security testing. It simulates offline dictionary-based attacks on WLANs.
Simple proxy for Native Messaging Hosts in Chrome extensions, allowing for executing MITM on them
An open source tool to detect deauth, Evil Twin, Clonned wifi, Arp Spoofing and Man in the Middle attacks.
Arp Poisoning tool in C using raw sockets
🔨 HAMMER OF THE GODS 🔨 - An advanced network toolkit for security professionals and network administrators. Featuring comprehensive IPv4/IPv6 scanning, ARP/ND spoofing, security testing, and network manipulation capabilities. Built for authorized security assessments with artistic terminal output and detailed logging. Educational purposes only!
¿Quieres empezar en el mundo hacking? En esta revista te enseño a instalar Kali Linux desde cero y a manipular herramientas esenciales en el Hacking Ético.
Add a description, image, and links to the mitm-attacks topic page so that developers can more easily learn about it.
To associate your repository with the mitm-attacks topic, visit your repo's landing page and select "manage topics."