Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   MITM
ci_fuzz - Command Injection Web Fuzzer Script for mitmproxy.

ci_fuzz – Command Injection Web Fuzzer Script for mitmproxy.

December 26, 2017
eldad
Code Scripting, Fuzzer/Fuzzing

ci_fuzz script fuzz’s for Command Injection vulnerabilities resulting in remote command execution. + Similiar OWASP vulnerablities are explained here –> https://www.owasp.org/index.php/Command_Injection + The script will…

Read Article →
ratched is a Man-in-the-Middle (MitM) proxy that specifically intercepts TLS connections.

ratched is a Man-in-the-Middle (MitM) proxy that specifically intercepts TLS connections.

November 26, 2017
0x0mar
Encryption, Networking, Penetration Test

ratched is a Man-in-the-Middle (MitM) proxy that specifically intercepts TLS connections. It is intended to be used in conjunction with the Linux iptabes REDIRECT target;…

Read Article →
Nili is a Tool for Network Scan, Man in the Middle, Protocols Reverse Engineering and Fuzzing.

Nili is a Tool for Network Scan, Man in the Middle, Protocols Reverse Engineering and Fuzzing.

August 21, 2017
ahm3ds
Fuzzer/Fuzzing, Networking, Penetration Test

LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal…

Read Article →
SigFW - an Open Source Signaling Firewall for SS7, Diameter filtering, antispoof and antisniff.

SigFW – an Open Source Signaling Firewall for SS7, Diameter filtering, antispoof and antisniff.

August 1, 2017
Dmitry
Firewall, Mobile Applications Tools

SigFW is an Open Source SS7/Diameter firewall for Antisniff, Antispoof & Threat Hunt. Abstract The SS7/Sigtran protocol stack mobile vulnerabilities affect the security of all…

Read Article →
PoC of the Poodle Attack against SSL/TLS

poodle-Poc ~ Poodle (Padding Oracle On Downgraded Legacy Encryption) attack.

July 31, 2017
Fragile
Cryptography, Encryption, Penetration Test

poodle-PoC is PoC explore the cryptography behind the attack, it can be assimilate to the MiTM. Poodle allow you to retrieve plaintext messages if the…

Read Article →
glassdoor is a modern, autonomous security framework for Android APKs.

glassdoor is a modern, autonomous security framework for Android APKs.

July 26, 2017
0x0ptimus
Android Tools, Encryption, Framework, Penetration Test

glassdoor is a modern, autonomous security framework for Android APKs written in Scala. Its purpose is to automatically find backdoors, security flaws and other data…

Read Article →
Toucan is a Wireless Intrusion Detection System.

Toucan is a Wireless Intrusion Detection System.

July 16, 2017
K-159
Intrussion Detection and Prevention System(IDS/IPS), Wireless/wifi

Toucan is currently a monitor to defend against man in the middle attacks (Both IPv4/IPv6 attacks) on a wireless network. For IPv4, when an attacker…

Read Article →
Pentesting-Multitool ~ Different utility scripts for pentesting and hacking.

Pentesting-Multitool ~ Different utility scripts for pentesting and hacking.

July 3, 2017
Fragile
Networking, Penetration Test

Pentesting-Multitool project arises from the need to gather some pentesting tools into one tool. It will be developed using Python3 adding some external libraries as…

Read Article →
1 2 … 22 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools