MITMf/plugins
byt3bl33d3r 14580f1589 second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version.
removed some useless code (left over from the responder plugin), serverResponseStatus hook now returns a dict (tuple was causing errors)
2015-05-30 15:00:41 +02:00
..
__init__.py This is 1/2 of the work done... lot's of cool stuff! 2015-04-27 18:33:55 +02:00
AppCachePoison.py Initial working PoC for the Ferret-NG plugin that will replace the SessionHijacker plugin: it will capture cookies and trasparently feed them to the proxy it starts up on port 10010 (by default), this way we just have to connect to the proxy, browse to the same website as the victim and we will automatically hijack their session! \o/ 2015-05-11 03:13:45 +02:00
BeefAutorun.py Screenshotter plugin now live! 2015-05-16 21:22:11 +02:00
BrowserProfiler.py Fixed a bug in SSLstrip+ code, when redirecting to certain sites 2015-05-19 00:00:40 +02:00
BrowserSniper.py Fixed a bug in SSLstrip+ code, when redirecting to certain sites 2015-05-19 00:00:40 +02:00
CacheKill.py Initial working PoC for the Ferret-NG plugin that will replace the SessionHijacker plugin: it will capture cookies and trasparently feed them to the proxy it starts up on port 10010 (by default), this way we just have to connect to the proxy, browse to the same website as the victim and we will automatically hijack their session! \o/ 2015-05-11 03:13:45 +02:00
FerretNG.py Screenshotter plugin now live! 2015-05-16 21:22:11 +02:00
FilePwn.py Fixed a bug in SSLstrip+ code, when redirecting to certain sites 2015-05-19 00:00:40 +02:00
Inject.py This commit is just to push the changes so far to github , still have to tidy things up here and there and fix some bugs (also I really hate javascript) 2015-05-16 00:43:56 +02:00
JsKeylogger.py This commit is just to push the changes so far to github , still have to tidy things up here and there and fix some bugs (also I really hate javascript) 2015-05-16 00:43:56 +02:00
plugin.py second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version. 2015-05-30 15:00:41 +02:00
Replace.py Initial working PoC for the Ferret-NG plugin that will replace the SessionHijacker plugin: it will capture cookies and trasparently feed them to the proxy it starts up on port 10010 (by default), this way we just have to connect to the proxy, browse to the same website as the victim and we will automatically hijack their session! \o/ 2015-05-11 03:13:45 +02:00
Responder.py Screenshotter plugin now live! 2015-05-16 21:22:11 +02:00
Screenshotter.py Fixed a bug in SSLstrip+ code, when redirecting to certain sites 2015-05-19 00:00:40 +02:00
SMBAuth.py This commit is just to push the changes so far to github , still have to tidy things up here and there and fix some bugs (also I really hate javascript) 2015-05-16 00:43:56 +02:00
SMBTrap.py second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version. 2015-05-30 15:00:41 +02:00
Spoof.py second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version. 2015-05-30 15:00:41 +02:00
SSLstrip+.py second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version. 2015-05-30 15:00:41 +02:00
TestPlugin.py second implementation of the HTTP server, you can now define shares for the SMB server in the config file, added an option to switch between the normal SMB server and the Karma version. 2015-05-30 15:00:41 +02:00
Upsidedownternet.py Initial working PoC for the Ferret-NG plugin that will replace the SessionHijacker plugin: it will capture cookies and trasparently feed them to the proxy it starts up on port 10010 (by default), this way we just have to connect to the proxy, browse to the same website as the victim and we will automatically hijack their session! \o/ 2015-05-11 03:13:45 +02:00