MITMsmtp is an Evil SMTP Server for pentesting SMTP clients to catch login credentials and mails sent over plain or SSL encrypted connections.
☆45Jan 28, 2024Updated 2 years ago
Alternatives and similar repositories for MITMsmtp
Users that are interested in MITMsmtp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- A curated list of static analysis tools, linters and code quality checkers for various programming languages☆47Nov 15, 2016Updated 9 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆103May 6, 2024Updated last year
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- ☆15Feb 12, 2023Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago
- ☆10Mar 27, 2022Updated 3 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- :.IP webcam penetration test suit.:☆24Apr 8, 2019Updated 6 years ago
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 4 years ago
- Library of BOFs to interact with SQL servers☆16Dec 6, 2024Updated last year
- [CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)☆13Nov 9, 2020Updated 5 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- WallEscape vulnerability in util-linux☆51Mar 30, 2024Updated last year
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- Easily count site visitors with AWS Lambda and display it on your site.☆13Apr 15, 2025Updated 11 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- wspcoerce coerces a Windows computer account via SMB to an arbitrary target using MS-WSP☆136Nov 24, 2025Updated 4 months ago
- ☆13Apr 27, 2025Updated 10 months ago
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆13Feb 19, 2022Updated 4 years ago
- High performance, distributed port scanner for mostly bugbounty. Fast by FastAPI.☆21May 2, 2024Updated last year
- dontpopme bitches☆23Jun 16, 2022Updated 3 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Sep 5, 2025Updated 6 months ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Sep 25, 2020Updated 5 years ago
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆24Jun 8, 2024Updated last year
- EventViewer Bypass Uac Bof☆23Jul 23, 2022Updated 3 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- A python tool to dissect various BLE GATT packets for replay and analysis.☆13Dec 29, 2019Updated 6 years ago
- ☆25Jul 11, 2022Updated 3 years ago
- HTTP(s) Screenshots for Pen Testers Who Value Their Time☆85Nov 21, 2024Updated last year
- Two applications for the M5Stack ATOM Echo running MicroPython.☆14Jun 2, 2020Updated 5 years ago