VOODOO
MITB attack framework
A framework for creating man-in-the-browser attacks on macOS-based browsers without requiring root privileges or TCC permissions.
Man in the Browser Framework
40 stars
3 watching
7 forks
Language: Ruby
last commit: almost 3 years ago
Linked from 1 awesome list
brave-browserchromeedge-browserinfosecmacosmain-in-the-browseropera-browserpentestingredteam
Related projects:
Repository | Description | Stars |
---|---|---|
| An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |
| A framework to help security analysts understand and prepare for adversarial machine learning attacks on AI systems | 1,056 |
| An automated mobile application security assessment platform capable of performing static and dynamic analysis. | 11 |
| An attack framework to manipulate the output of large language models and vision-language models | 14 |
| An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
| A repository of known security issues in Magento extensions to help developers identify and address vulnerabilities in their codebase. | 202 |
| A tool for detecting and analyzing security vulnerabilities in Xamarin mobile applications | 89 |
| An adversarial attack framework on large vision-language models | 165 |
| An extension for a Java-based proxy that intercepts HTTPS connections and enables caching while offline. | 225 |
| A Python-based framework for conducting man-in-the-middle attacks and rogue access point exploits on wireless networks. | 2,016 |
| A Python framework that provides an API interface to multiple online services for analyzing malware and threat intelligence | 368 |
| A comprehensive resource for understanding and visualizing the relationships between different types of cyber attacks and their tactics, techniques, and procedures. | 18 |
| Automated attack synthesis tool for discovering vulnerabilities in CPU architecture and cryptographic protocols | 18 |
| Scans networks to identify vulnerabilities by correlating CPEs with CVEs using an API | 562 |
| A tool allowing visibility into network traffic by intercepting and displaying HTTP/1, HTTP/2, and WebSocket requests and responses. | 416 |