Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

m4n3dw0lf/sslkill

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

49 Commits

Repository files navigation

sslkill

SSL Kill is a forced man-in-the-middle transparent reverse proxy that modifies HTTP requests and responses in order to avoid SSL and HSTS, to achieve that, it use a two-way ARP spoofing plus a forced DNS resolver that redirects all name server queries to the attacker IP Address. This tool is for information security researchers and should not be used for criminal acts

SSL Kill v1.2

alt text

Installation

 $sudo apt-get install build-essential python-dev libnetfilter-queue-dev
 $git clone https://github.com/m4n3dw0lf/sslkill
 $cd sslkill
 $sudo pip install -r requirements.txt
 $sudo chmod +x sslkill.py
 $sudo ./sslkill.py -h

Basics

usage: 
 Network interface: -i <INTERFACE> or --interface <INTERFACE> 
 Target IP Address: -t <TARGET> or --target <TARGET> 
 Gateway IP Address:	-g <GATEWAY> or --gateway <GATEWAY>
 Listening Port: -l <PORT> or --listen <PORT>
 Debug mode:	 -d Turn debugger ON, default = OFF
examples:
 $sudo ./sslkill.py -i wlan0 -t 10.0.0.3 -g 10.0.0.1

About

Forced Man-In-The-Middle HTTPs-Avoiding Reverse Proxy

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

AltStyle によって変換されたページ (->オリジナル) /