PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Man-in-the-Middle

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Access Point AttackBackdoorFactoryBeEFMan-in-the-MiddleMITMNetwork Wireless HackingNEW TOOLSPcapRogue Wi-FiSnoopingWi-FiWiFi-PumpkinWireless Attack Toolkit

WiFi-Pumpkin v0.8.7 – Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including rogue Wi-Fi access points, deauth attacks on client APs, a probe request and credentials monitor, transparent proxy, Windows update attack, phishing manager, ARP Poisoning, DNS Spoofing, Pumpkin-Proxy, and image capture on the fly. moreover, the WiFi-Pumpkin is a very complete framework for auditing Wi-Fi security check the list of features is quite broad.InstallationPython 2.7…

DoSIsipMan-in-the-MiddleManipulationNEW TOOLSPcapSIP

Isip – Interactive Sip Toolkit For Packet Manipulations, Sniffing, Man In The Middle Attacks, Fuzzing, Simulating Of Dos Attacks

Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.VideoSetupgit clone isippip install -r requirements.txtUsagePacket manipulation tools are in packet cmd loop. First start, you are in the main cmd loop.isip:main> packetisip:packet>Create a new sip packet with new command. If you don't write name, isip create the packet named by message-{id}.isip:packet> newisip:packet> new r1List the all created sip packets with list command.isip:packet> listShow properties of packets with show command. You can type ip, udp or sip…

MacMan-in-the-MiddleMan-in-the-Middle Attack FrameworkMITMMITM FrameworkNEW TOOLS

BetterCap v2.10 – The Swiss Army Knife For 802.11, BLE And Ethernet Networks Reconnaissance And MITM Attacks

bettercap is the Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and attacks.How to InstallA precompiled version is available for each release, alternatively you can use the latest version of the source code from this repository in order to build your own binary.Make sure you have a correctly configured Go >= 1.8 environment, that $GOPATH/bin is in $PATH, that the libpcap-dev and libnetfilter-queue-dev (this one is only required on Linux) package installed for your system and then:$ go get github.com/bettercap/bettercap$ cd $GOPATH/src/github.com/bettercap/bettercap$…

EvilginxEvilginx2Man-in-the-MiddleMan-in-the-Middle Attack FrameworkNEW TOOLSpenetration testingSSL/TLS

Evilginx v2.0 – Standalone Man-In-The-Middle Attack Framework Used For Phishing Login Credentials Along With Session Cookies, Allowing For The Bypass Of 2-Factor Authentication

evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection.This tool is a successor to Evilginx, released in 2017, which used a custom version of nginx HTTP server to provide man-in-the-middle functionality to act as a proxy between a browser and phished website. Present version is fully written in GO as a standalone application, which implements its own HTTP and DNS server, making it extremely easy to set up and…

DHCPEthernetEttercapLibPCAPMacMan-in-the-MiddleMITMNEW TOOLSScanSniffingSSHSSLstrip

Ettercap – A Comprehensive Suite For Man In The Middle Attacks

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.ETTERCAP OFFERS THREE INTERFACES, TRADITIONAL COMMAND LINE, GUI AND NCURSES.Supported DistributionsThese distributions have been tested in both 32 and 64 bit flavors where possibleDebian/Ubuntu (Includes derivatives such as Kali, BackTrack, Mint, etc)FedoraGentooPentooMac OSX (Snow Leopard & Lion)FreeBSDOpenBSDNetBSDUnsupported DistributionsInstallation may work…

DATAdatasploitJSONKaliMan-in-the-MiddleMITMNEW TOOLS

Datasploit – An OSINT Framework To Perform Various Recon Techniques On Companies, People, Phone Number, Bitcoin Addresses, Etc., Aggregate All The Raw Data, And Give Data In Multiple Formats

Overview of the tool:Performs OSINT on a domain/email/username/phone and find out information from different sources.Correlate and collaborate the results, show them in a consolidated manner.Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc. related to the target.Use specific script / launch automated OSINT for consolidated data.Performs Active Scans on collected data.Generates HTML, JSON reports along with text files.Basic Usage: ____/ /____ _ / /_ ____ _ _____ ____ / /____ (_)/ /_ / __ // __ `// __// __ `//…