[go: up one dir, main page]

Search Results for "man in the middle attack" - Page 4

Showing 101 open source projects for "man in the middle attack"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Securing the Cloud Made Easy Icon
    Securing the Cloud Made Easy

    Multi-cloud security delivered — now and in the future.

    Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.
    Learn More
  • 1
    SpoofyR2 is a VB.NET tool which allows you to jump in an existing network connection between 2 hosts (man-in-the-middle). For example you are able to manipulate some network-traffic like a dns-request.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MapProxy is an open source technology used to create and serve up map caches. It is a middle-man between existing web map servers (like MapServer or GeoServer) and web map clients such as OpenLayers and GoogleEarth.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    SMPI - SMS Message Passing Interface
    SMPI Is a message passing interface which uses a Google Voice account to set up a man in the middle type environment between two cell phones. This tool allows the user to control the exchange of messages in real time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A Bash script aimed at making the Wireless Hacking process a lot easier.
    Leader badge">
    Downloads: 1 This Week
    Last Update:
    See Project
  • Easy-to-use online form builder for every business. Icon
    Easy-to-use online form builder for every business.

    Create online forms and publish them. Get an email for each response. Collect data.

    Easy-to-use online form builder for every business. Create online forms and publish them. Get an email for each response. Collect data. Design professional looking forms with JotForm Online Form Builder. Customize with advanced styling options to match your branding. Speed up and simplify your daily work by automating complex tasks with JotForm’s industry leading features. Securely and easily sell products. Collect subscription fees and donations. Being away from your computer shouldn’t stop you from getting the information you need. No matter where you work, JotForm Mobile Forms lets you collect data offline with powerful forms you can manage from your phone or tablet. Get the full power of JotForm at your fingertips. JotForm PDF Editor automatically turns collected form responses into professional, secure PDF documents that you can share with colleagues and customers. Easily generate custom PDF files online!
    Learn More
  • 5
    Hyenae
    Hyenae is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant. *** Hyenae is back *** Hyenae will be continued here: https://sourceforge.net/p/hyenae-ng
    Leader badge">
    Downloads: 66 This Week
    Last Update:
    See Project
  • 6
    RTCP is a network man-in-the-middle service for protecting TCP, enabling fault-tolerant servers to recover their connections when restarting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    edx33v2 is a Silkroad Online proxy application that uses a man-in-the-middle attack vector to provide the end user full access to the underlying communication channel between the client and server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Transparent TCP MITM proxy
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Infrastructure for opportunistically establish security against MiTM adversaries and, in cooperation with other clients, detect their attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Taking the Paper Out of Work Icon
    Taking the Paper Out of Work

    For organizations that need powerful ECM and document automation software

    The Square 9 AI-powered intelligent document processing platform takes the paper out of work and makes it easier to get things done with digital workflows.
    Learn More
  • 10
    This project is a Java based detector, which can detect five of Fowler et al. (1999)'s Code Bad Smells: Data Clumps, Switch Statements, Speculative Generality, Message Chains, and Middle Man, from Java Source Code.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Dies ist der WHO Attack Calculator, mit dem man Angriffe so fuer World Hack (http://world-hack.org) berechnen kann, dass angegeben wird, ob Viren geloescht werden oder nicht.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Netstorm is a highly flexible, fast and plattform independent network security and reliability tester which allows you to setup real world low level flood attack scenarios (such as MITM, DoS and DDoS) within a local area network and on the internet.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    TSeep is a local network proxy used to MITM SSL and other standard/non-standard TCP based protocols.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Mock in the Middle is a Java Proxy designed for testing network applications. It serves as a mock proxy between a client and a server. By recording and replaying network conversations, the client can later be tested without a live server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Sting is a simple, host-based approach to detecting arp cache poisoning based man in the middle attacks (such as made by ettercap) on your LAN. It uses SNMP to periodically query the arp cache of your router and make sure its entry for you is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Program to help iPodWizard users what a theme will look like on their iPod without having to write to the firmware; taking out the middle man.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Windows Hijacker is a tool for hijacking tcp connections on Windows OS. WinHijacker include ARP Poisoner for Man In The Middle (MITM) and a small tcp/ip stack. For any problem go to 'Forums' section. The documentation is in 'Docs' section.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    GPP is a General Purpose Proxy Java graphical application intended mainly for packet inspection and modification. It's main idea is to be a little user-friendly portable man-in-the-middle tool for security analysis. Later, some protocols should be added
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    EtherMan: Ethernet Man In The Middle Attack Tool. It is capable of forcing traffic between two hosts to pass by a third party (MITM) and then redirected to its original destination again. This program is written for educational reasons, and I am not res
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    fwdaemon is used to control iptables and interfaces a mysql database. This program runs as a system daemon and acts as the middle man between placing iptables (and tc) user space linux commands into kernel memory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Middleman is an advanced HTTP/1.1 proxy server with features designed to increase privacy and remove unwanted content.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22
    Middle Age Man is a Bomberman-like game. Knights are fighting to death with a large choice of weapons. The specificity of Middle Age Man is that these knights are not controlled by human players. They are artificial intelligence. Everyone can prog
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    NetBox is a software programmed in C for testing vulnerabilities in the network. Using this software you can attack your network using a combination of differents known attacks (ARP or DNS Spoofing, MITM, ...) and detect bugs of security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ISR-evilgrade: is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates.
    Downloads: 0 This Week
    Last Update:
    See Project