• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

mitm

  1. P

    Websploit is a high level MITM framework

    Hidden content NOTE : THE TOOL IS NOT MINE, I AM JUST SHARING IT FOR EDUCATIONAL PURPOSE.
  2. 0x1

    SKA - Simple Karma Attack

    SKA - Simple Karma Attack SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice the fake AP name or, if you want, you could insert manually the name of AP (evil twin attack). When target has connected to your WLAN you could active the HTTP...
  3. itsMe

    Seth - Perform A MitM Attack And Extract Clear Text Credentials From RDP Connections

    Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests...
  4. F B I

    SMB MITM TOOLS

    Hidden content
  5. 1

    Exploits Mac OS X libxpc MITM Privilege Escalation

    This Metasploit module exploits a vulnerability in libxpc on macOS versions 10.13.3 and below. The task_set_special_port API allows callers to overwrite their bootstrap port, which is used to communicate with launchd. This port is inherited across forks: child processes will use the same...
  6. F B I

    Hack Gmail with the MITM method

    Hidden content
Back
Top