This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such as the internet proxies commonly found in corporate environments. It does this by comparing the SSL intermediate certificate being used for your connection to the true/known SSL certificate for the server.
☆68Feb 9, 2018Updated 8 years ago
Alternatives and similar repositories for Detect-SSLmitm
Users that are interested in Detect-SSLmitm are comparing it to the libraries listed below
Sorting:
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- ☆229May 10, 2018Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 12 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 5 months ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- SMB Relay Attack Script☆146Dec 6, 2018Updated 7 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆736Feb 5, 2019Updated 7 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Python script that runs Masscan against an IP to collect open ports, feed those ports to Nmap, which finds service versions and runs defa…☆23Jul 24, 2021Updated 4 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,304Aug 19, 2019Updated 6 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,642Oct 11, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- PowerKrabsEtw is a PowerShell interface for doing real-time ETW tracing.☆103Nov 17, 2020Updated 5 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆362Nov 19, 2024Updated last year
- ☆50Sep 25, 2017Updated 8 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- A repository of some of my Windows 10 Device Guard Bypasses☆139Aug 3, 2017Updated 8 years ago