[
  {
    "path": "LICENSE",
    "content": "CC0 1.0 Universal\n\nStatement of Purpose\n\nThe laws of most jurisdictions throughout the world automatically confer\nexclusive Copyright and Related Rights (defined below) upon the creator and\nsubsequent owner(s) (each and all, an \"owner\") of an original work of\nauthorship and/or a database (each, a \"Work\").\n\nCertain owners wish to permanently relinquish those rights to a Work for the\npurpose of contributing to a commons of creative, cultural and scientific\nworks (\"Commons\") that the public can reliably and without fear of later\nclaims of infringement build upon, modify, incorporate in other works, reuse\nand redistribute as freely as possible in any form whatsoever and for any\npurposes, including without limitation commercial purposes. These owners may\ncontribute to the Commons to promote the ideal of a free culture and the\nfurther production of creative, cultural and scientific works, or to gain\nreputation or greater distribution for their Work in part through the use and\nefforts of others.\n\nFor these and/or other purposes and motivations, and without any expectation\nof additional consideration or compensation, the person associating CC0 with a\nWork (the \"Affirmer\"), to the extent that he or she is an owner of Copyright\nand Related Rights in the Work, voluntarily elects to apply CC0 to the Work\nand publicly distribute the Work under its terms, with knowledge of his or her\nCopyright and Related Rights in the Work and the meaning and intended legal\neffect of CC0 on those rights.\n\n1. Copyright and Related Rights. A Work made available under CC0 may be\nprotected by copyright and related or neighboring rights (\"Copyright and\nRelated Rights\"). Copyright and Related Rights include, but are not limited\nto, the following:\n\n  i. the right to reproduce, adapt, distribute, perform, display, communicate,\n  and translate a Work;\n\n  ii. moral rights retained by the original author(s) and/or performer(s);\n\n  iii. publicity and privacy rights pertaining to a person's image or likeness\n  depicted in a Work;\n\n  iv. rights protecting against unfair competition in regards to a Work,\n  subject to the limitations in paragraph 4(a), below;\n\n  v. rights protecting the extraction, dissemination, use and reuse of data in\n  a Work;\n\n  vi. database rights (such as those arising under Directive 96/9/EC of the\n  European Parliament and of the Council of 11 March 1996 on the legal\n  protection of databases, and under any national implementation thereof,\n  including any amended or successor version of such directive); and\n\n  vii. other similar, equivalent or corresponding rights throughout the world\n  based on applicable law or treaty, and any national implementations thereof.\n\n2. Waiver. To the greatest extent permitted by, but not in contravention of,\napplicable law, Affirmer hereby overtly, fully, permanently, irrevocably and\nunconditionally waives, abandons, and surrenders all of Affirmer's Copyright\nand Related Rights and associated claims and causes of action, whether now\nknown or unknown (including existing as well as future claims and causes of\naction), in the Work (i) in all territories worldwide, (ii) for the maximum\nduration provided by applicable law or treaty (including future time\nextensions), (iii) in any current or future medium and for any number of\ncopies, and (iv) for any purpose whatsoever, including without limitation\ncommercial, advertising or promotional purposes (the \"Waiver\"). Affirmer makes\nthe Waiver for the benefit of each member of the public at large and to the\ndetriment of Affirmer's heirs and successors, fully intending that such Waiver\nshall not be subject to revocation, rescission, cancellation, termination, or\nany other legal or equitable action to disrupt the quiet enjoyment of the Work\nby the public as contemplated by Affirmer's express Statement of Purpose.\n\n3. Public License Fallback. Should any part of the Waiver for any reason be\njudged legally invalid or ineffective under applicable law, then the Waiver\nshall be preserved to the maximum extent permitted taking into account\nAffirmer's express Statement of Purpose. In addition, to the extent the Waiver\nis so judged Affirmer hereby grants to each affected person a royalty-free,\nnon transferable, non sublicensable, non exclusive, irrevocable and\nunconditional license to exercise Affirmer's Copyright and Related Rights in\nthe Work (i) in all territories worldwide, (ii) for the maximum duration\nprovided by applicable law or treaty (including future time extensions), (iii)\nin any current or future medium and for any number of copies, and (iv) for any\npurpose whatsoever, including without limitation commercial, advertising or\npromotional purposes (the \"License\"). The License shall be deemed effective as\nof the date CC0 was applied by Affirmer to the Work. Should any part of the\nLicense for any reason be judged legally invalid or ineffective under\napplicable law, such partial invalidity or ineffectiveness shall not\ninvalidate the remainder of the License, and in such case Affirmer hereby\naffirms that he or she will not (i) exercise any of his or her remaining\nCopyright and Related Rights in the Work or (ii) assert any associated claims\nand causes of action with respect to the Work, in either case contrary to\nAffirmer's express Statement of Purpose.\n\n4. Limitations and Disclaimers.\n\n  a. No trademark or patent rights held by Affirmer are waived, abandoned,\n  surrendered, licensed or otherwise affected by this document.\n\n  b. Affirmer offers the Work as-is and makes no representations or warranties\n  of any kind concerning the Work, express, implied, statutory or otherwise,\n  including without limitation warranties of title, merchantability, fitness\n  for a particular purpose, non infringement, or the absence of latent or\n  other defects, accuracy, or the present or absence of errors, whether or not\n  discoverable, all to the greatest extent permissible under applicable law.\n\n  c. Affirmer disclaims responsibility for clearing rights of other persons\n  that may apply to the Work or any use thereof, including without limitation\n  any person's Copyright and Related Rights in the Work. Further, Affirmer\n  disclaims responsibility for obtaining any necessary consents, permissions\n  or other rights required for any use of the Work.\n\n  d. Affirmer understands and acknowledges that Creative Commons is not a\n  party to this document and has no duty or obligation with respect to this\n  CC0 or use of the Work.\n\nFor more information, please see\n<http://creativecommons.org/publicdomain/zero/1.0/>\n"
  },
  {
    "path": "README.md",
    "content": "# Awesome-MitM\nCurated list of MitM frameworks on GitHub\n\n### [bettercap](https://github.com/evilsocket/bettercap)\n\nA complete, modular, portable and easily extensible MITM framework\n\n### [CopyCat](https://github.com/compewter/CopyCat)\n\nCopyCat is a Node.js based universal MITM web server. Used with DNS spoofing or another redirect attack, this server will act as a MITM for web traffic between the victim and a real server.\n\n### [dnschef](https://github.com/iphelix/dnschef)\n\nDNSChef - DNS proxy for Penetration Testers and Malware Analysts\n\n### [dnsmitm](https://github.com/SySS-Research/dns-mitm)\n\nA minimal DNS service that can provide spoofed replies\n\n### [Ettercap](https://github.com/Ettercap/ettercap)\n\nEttercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.\n\n### [FakeDns](https://github.com/Crypt0s/FakeDns)\n\nA regular-expression based python MITM DNS server with support for DNS Rebinding attacks\n\n### [hyperfox](https://github.com/malfunkt/hyperfox)\n\nHTTP/HTTPs MITM proxy and traffic recorder with on-the-fly TLS cert generation\n\n### [mallory](https://github.com/intrepidusgroup/mallory)\n\nAn extensible TCP/UDP man in the middle proxy that is designed to be run as a gateway\n\n### [MITMf](https://github.com/byt3bl33d3r/MITMf)\n\nFramework for Man-In-The-Middle attacks\n\n### [mitmproxy](https://github.com/mitmproxy/mitmproxy)\n\nAn interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers\n\n### [node-http-mitm-proxy](https://github.com/joeferner/node-http-mitm-proxy)\n\nHTTP Man In The Middle (MITM) Proxy written in node.js\n\n### [postgres-mitm](https://github.com/thusoy/postgres-mitm)\n\nTest whether your Postgres connections are vulnerable to MitM attacks\n\n### [tiny-mitm-proxy](https://github.com/floyd-fuh/tiny-mitm-proxy)\n\nProbably one of the smallest SSL MITM proxies you can make\n\n### [Seth](https://github.com/SySS-Research/Seth)\n\nPerform a MitM attack and extract clear text credentials from RDP connections \n\n### [ssh-mitm](https://github.com/jtesta/ssh-mitm)\n\nSSH man-in-the-middle tool\n\n### [sslsniff](https://github.com/moxie0/sslsniff)\n\nA tool for automated MITM attacks on SSL connections\n\n### [tornado](https://github.com/rebellionil/tornado)\n\nAll in one MITM tool .\n\n### [warcprox](https://github.com/internetarchive/warcprox)\n\nWARC writing MITM HTTP/S proxy\n\n### [websploit](https://github.com/websploit/websploit)\n\nAn advanced MITM framework\n\n### [wssip](https://github.com/nccgroup/wssip)\n\nApplication for capturing, modifying and sending custom WebSocket data from client to server and vice versa\n\n## Others\n\n### [mitmAP](https://github.com/xdavidhu/mitmAP)\n\nA python program to create a fake AP and sniff data\n\n### [mitm-vm](https://github.com/praetorian-inc/mitm-vm)\n\nAn easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities\n\n### [sshhipot](https://github.com/magisterquis/sshhipot)\n\nHigh-interaction MitM SSH honeypot\n\n### [suddensix](https://github.com/Neohapsis/suddensix)\n\nIPV6 MITM attack tool\n\n## Contributions\n\nPlease have a look at [contributing.md](contributing.md)\n"
  },
  {
    "path": "README_CN.md",
    "content": "# 优秀的中间人工具\nGitHub 上中间人框架的聚合列表\n\n### [bettercap](https://github.com/evilsocket/bettercap)\n\n一个完整的、模块化的、轻量的、易于扩展的中间人框架\n\n### [CopyCat](https://github.com/compewter/CopyCat)\n\nCopyCat 是一个基于 Node.js 实现的通用型中间人 Web 服务器，可与 DNS 欺骗或其他重定向攻击一起使用。此服务器用作受害者和真实服务器之间 Web 流量的中间人\n\n### [dnschef](https://github.com/iphelix/dnschef)\n\nDNSChef - 渗透测试工程师与恶意软件分析员的 DNS 代理\n\n### [dnsmitm](https://github.com/SySS-Research/dns-mitm)\n\n可提供 DNS 欺骗响应服务的最小 DNS 服务工具\n\n### [Ettercap](https://github.com/Ettercap/ettercap)\n\nEttercap 是个中间人攻击的工具集，具有实时连接嗅探、内容过滤以及其他特性\n\n### [FakeDns](https://github.com/Crypt0s/FakeDns)\n\nPython 实现的基于正则表达式的 DNS 中间人服务器，支持 DNS 重绑定攻击\n\n### [hyperfox](https://github.com/malfunkt/hyperfox)\n\n具有实时 TLS 证书生成功能的 HTTP/HTTPs 中间人代理与流量记录工具\n\n### [mallory](https://github.com/intrepidusgroup/mallory)\n\n被设计作为网关运行的一个可扩展 TCP/UDP 中间人代理工具\n\n### [MITMf](https://github.com/byt3bl33d3r/MITMf)\n\n中间人攻击框架\n\n### [mitmproxy](https://github.com/mitmproxy/mitmproxy)\n\n为渗透测试人员与软件开发者设计的交互式、支持 TLS、可拦截的 HTTP 代理工具\n\n### [node-http-mitm-proxy](https://github.com/joeferner/node-http-mitm-proxy)\n\nnode.js 编写的 HTTP 中间人攻击代理工具\n\n### [postgres-mitm](https://github.com/thusoy/postgres-mitm)\n\n测试你的 Postgres 连接是否易受中间人攻击\n\n### [tiny-mitm-proxy](https://github.com/floyd-fuh/tiny-mitm-proxy)\n\n可能是最小的 SSL 中间人代理工具\n\n### [Seth](https://github.com/SySS-Research/Seth)\n\n在 RDP 连接中执行中间人攻击，并提取明文凭据\n\n### [ssh-mitm](https://github.com/jtesta/ssh-mitm)\n\nSSH 中间人攻击工具\n\n### [sslsniff](https://github.com/moxie0/sslsniff)\n\n自动 SSL 中间人攻击工具\n\n### [tornado](https://github.com/rebellionil/tornado)\n\n中间人工具一锅出\n\n### [warcprox](https://github.com/internetarchive/warcprox)\n\n基于 pymiproxy 的 HTTP/S 中间人代理\n\n### [websploit](https://github.com/websploit/websploit)\n\n一个高级中间人框架\n\n### [wssip](https://github.com/nccgroup/wssip)\n\n用于在客户端与服务器间，捕获、修改、发送自定义 WebSocket 数据的应用程序\n\n## 其他\n\n### [mitmAP](https://github.com/xdavidhu/mitmAP)\n\n用于创建虚假 AP 并嗅探数据的 Python 程序\n\n### [mitm-vm](https://github.com/praetorian-inc/mitm-vm)\n\n易部署、提供各种中间人攻击工具的虚拟机\n\n### [sshhipot](https://github.com/magisterquis/sshhipot)\n\n高交互 SSH 中间人蜜罐\n\n### [suddensix](https://github.com/Neohapsis/suddensix)\n\nIPV6 中间人攻击工具\n\n## 完善项目\n\n帮助我们完善项目请查看 [contributing.md](contributing.md)\n"
  },
  {
    "path": "contributing.md",
    "content": "# Contribution Guidelines\n\nPlease follow the instructions below to make a contribution.\n\nThis resource was made by and made to developers and hackers alike! I appreciate and recognize all [contributors](#contributors).\n\n## Table of Content\n\n- [Adding to the list](#adding-to-the-list)\n- [To remove from the list](#to-remove-from-the-list)\n- [Contributors](#contributors)\n\n## Adding to the List\n\n- Please add the content to the `README.md` file and make sure that the edited list is in alphabetical order.\n- Submit a pull request.\n\n## Removing from the List\n\n- If you have any issues accessing any of the resources listed here, please let me know.\n\n## Contributors\n\n- [Chandrapal](https://github.com/Chan9390)\n- [Aan](https://github.com/aancw)\n- [NeverMine17](https://github.com/NeverMine17)\n"
  }
]