11 February 2011 | 16,932 views

Mallory – Transparent TCP & UDP Proxy

Cybertroopers storming your ship?

Mallory is a transparent TCP and UDP proxy. It can be used to get at those hard to intercept network streams, assess those tricky mobile web applications, or maybe just pull a prank on your friend.

In more technical terms, Mallory is an extensible TCP/UDP man in the middle proxy that is designed to be run as a gateway.

The goal is to man in the middle traffic for testing purposes. The ideal setup for Mallory is to have a “LAN” or “Victim” network that Mallory acts as the gateway for. This can be configured within a virtal machine environment using host only network interfaces. The victim virtual machines then configures the Mallory machine as the gateway by manually setting its gateway. The gateway machine will have at least one WAN interface that grants Internet access. The victim network then uses the Mallory gateway to route traffic.

Folder Structure

  • ca – certificate authority files including Mallory’s private key
  • certs – MiTM certs that are created on the fly
  • db – directory where mallory stores all database files
  • mallory – empty directory
  • src – where the code lives
  • scripts – scripts used to configure mallory enviorment


You can download Mallory here:


Or read more here.


Recent in Hacking Tools:
- RWMC – Retrieve Windows Credentials With PowerShell
- MITMf – Man-In-The-Middle Attack Framework
- LaZagne – Password Recovery Tool For Windows & Linux

Related Posts:
- MITMf – Man-In-The-Middle Attack Framework
- Hacking with Ramzi
- The greatest virus of all time

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,954,389 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,332,721 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 665,951 views

Low-cost VPS Hosting

One Response to “Mallory – Transparent TCP & UDP Proxy”

  1. DEVIL'S BLOG ON SECURITY 5 March 2011 at 11:27 am Permalink

    Sounds good