Anof-cyber / InterceptSuiteLinks
A cross platform SOCKS5 MITM proxy based network traffic interception tool that enables TLS/SSL inspection, analysis, and manipulation at the network level.
☆98Updated 2 weeks ago
Alternatives and similar repositories for InterceptSuite
Users that are interested in InterceptSuite are comparing it to the libraries listed below
Sorting:
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆114Updated 3 weeks ago
- Exploits Unauth Docker API☆41Updated 2 months ago
- Tool to aid in dumping LSASS process remotely☆40Updated 10 months ago
- Rust in-memory dumper☆108Updated last year
- Deploy a phishing infrastructure on the fly.☆69Updated 6 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- C2 Automation using Linode☆82Updated 2 years ago
- POC for DLL Proxying / Hijacking☆60Updated 3 weeks ago
- Living off the land searches for explorer and sharepoint☆86Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆84Updated 3 weeks ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 9 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆76Updated last week
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆75Updated 7 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 9 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 4 months ago
- .NET deserialization hunter☆77Updated 11 months ago
- Validates priv escalation of AD trusts☆44Updated 2 months ago
- ☆44Updated 11 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated last year
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Covert data exfiltration via DNS☆45Updated 4 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 3 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆90Updated last year
- Source code and examples for PassiveAggression☆61Updated last year
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- ☆70Updated 3 weeks ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year