trape
sslstrip
trape | sslstrip | |
---|---|---|
12 | 7 | |
7,919 | 1,857 | |
- | - | |
0.0 | 0.0 | |
2 months ago | almost 3 years ago | |
Python | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
trape
-
TRACK PEOPLE ON THE INTERNET: Learn to track your opps world, to avoid being traced
Github Link
- ILPT Request: how do I track a phone...
- ILPT Request: How to bypass phishing detection? Google detects my phishing link that I send to shit faces that like to spread rumors and damage reputation. Google detects every link sent to an android phone.
- Some information and advice about DDoS, from someone who was there during #opPayback
- trape - Tool to track and execute intelligent social engineering attacks in real time.
- Tool to track and execute intelligent social engineering attacks in real time
- Using Pi4 running Bettercap as a honeypot to catch a legit stalker
-
Can you backtrace a VPN covered IP to reach its origin? If so, which is the process (from a high-level)
Well I would highly recommend using this Trape OSINT tool for tracking people on internet (Github)
- Android RAT
- What are some other cool tools for beginners like me ?
sslstrip
- Some information and advice about DDoS, from someone who was there during #opPayback
- List of resources
-
Is there a tool to control bandwidth for debugging purposes?
Another option might be to try something like sslstrip to strip off the TLS layer so you can point your tools at the stripped-off/non-TLS endpoint. Probably non-trivial to get this old code working on any system though, let alone a Jetson: https://github.com/moxie0/sslstrip
-
Awesome Penetration Testing
sslstrip - Demonstration of the HTTPS stripping attacks.
-
Tracking One Year of Malicious Tor Exit Relay Activities (Part II)
Yeah. And for anyone unaware, this technique, SSL stripping, was made well-known (and arguably pioneered?) by Moxie Marlinspike of Signal with his tool sslstrip back in 2011: https://github.com/moxie0/sslstrip. I believe that's what he was most famous for before Signal.
-
MITM (Man-In-The-Middle) Attacks and Prevention
Once the connection has been intercepted, the attacker can use a tool such as sslstrip to disable all HTTPS redirects and change https:// links to unencrypted http://.
-
Qualcuno mi sa spiegare perché il sito del SENATO non utilizza il protocollo https? (rendendolo di fatto "insicuro")
E' possibile, per quanto molto meno facile. https://github.com/moxie0/sslstrip per esempio. Ci sono anche altre tecniche che si basano sulla manipolazione delle richieste di DNS e cose simili. Sicuramente molto piu' facile da notare e ordini di grandezza piu' complesso di HTTP, che è assolutamente triviale.
What are some alternatives?
Android-RATList - Android - Remote Access Trojan List
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
email2phonenumber - A OSINT tool to obtain a target's phone number just by having his email address
toxiproxy - :alarm_clock: :fire: A TCP proxy to simulate network and system conditions for chaos and resiliency testing
dirsearch - Web path scanner
EvilOSX - An evil RAT (Remote Administration Tool) for macOS / OS X.
osmedeus - A Workflow Engine for Offensive Security
SQLMap - Automatic SQL injection and database takeover tool
GRecon - Another version of katana, more automated but less stable. the purpose of this small tool is to run a Google based passive recon against your scope.
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
longtongue - Customized Password/Passphrase List inputting Target Info
RustScan - 🤖 The Modern Port Scanner 🤖