bettercap is a complete, modular, portable and easily extensible MITM tool and framework with every kind of diagnostic and offensive feature you could need in order to perform a man in the middle attack. All dependencies will be automatically installed through the RubyGems system but in some cases you might need to install some system dependency in order to make everything work.
bettercap mitm man-in-the-middle spoofing security security-audit tls proxy ettercap sslstripA tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them off your local area network. Compatible with Python 3+ 🎉.
spoofing wireless hacking wifibettercap is the Swiss Army knife for 802.11, BLE and Ethernet networks reconnaissance and attacks. A precompiled version is available for each release, alternatively you can use the latest version of the source code from this repository in order to build your own binary.
bettercap bettercap-ng password-sniffer mitm man-in-the-middle rogue-ap wireless wifi hacking security spoofing proxy golang-application wifi-security deauthentication-attack dot11 network-attacks monitoringA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
hacking-tool windows-hacking backdoor execution-policy-bypass hacking pentest uac-bypass kill-antivirus kali-linux powershell phishing social-engineering scam avs runas anti-forensics persistence spoofing malware dr0p1tbettercap-ng is a complete reimplementation of bettercap, the Swiss army knife for network attacks and monitoring. It is faster, stabler, smaller, easier to install and to use. In this repository, BetterCAP is containerized using Alpine Linux - a security-oriented, lightweight Linux distribution based on musl libc and busybox. The resulting Docker image is relatively small and easy to manage the dependencies.
bettercap bettercap-ng password-sniffer mitm man-in-the-middle rogue-ap wireless wifi hacking security spoofing proxy golang-applicationBob is a free signal-processing and machine learning toolbox originally developed by the Biometrics group at the Idiap Research Institute, Switzerland. The toolbox is written in a mix of Python and C++ and is designed to be both efficient and reduce development time. It is composed of a reasonably large number of packages that implement tools for image, audio & video processing, machine learning & pattern recognition, and a lot more task specific packages.
machine-learning signal-processing biometrics face-detection face-recognition speaker-verification speaker-recognition neural-network gmm gmm-ubm io spoofing landmark-detection feature-extraction classification regression speech-processing cpp detRelay UDP torrent tracker traffic via TCP. Normally, tracker communication goes through UDP. But in some companies or schools, all UDP traffic is blocked by the network admins. However, TCP/IP traffic is of course not blocked. Hopefully you can connect with any external host. If so, we can setup a proxy system that will allow you to do the tracker communication by using TCP instead of UDP, which hopefully not blocked.
torrent tracker udp udp-traffic tracker-communication proxy spoofing tunnelingSimple security surveillance script for linux distributions. The Eye can detect possible ARP poisoning, DNS spoofing and suspicous connections(meterpreter/reverse shell/bind shell) on tcp. Checks the arp chache and default gateway continiosly.
arp-poisoning suspicous-connections surveillance monitoring meterpreter spoofing securityAn Application for Spoofing Movement written in Golang
spoof spoofing gps gps-location spoofgps gps-spoofing cli cli-app api guiSimple program to spoof file extensions and icons. Warning: The program you are trying to spoof may start to change its name randomly (with a .tmp extension). This is Windows defenders fault, and you will most likely see a pop-up message in your bottom right corner. To fix this you can either disable Windows defender (not recommended) or whitelist the program.
spoofing spoof extension-spoof filespoof file-spoof hack hacking
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.