This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such as the internet proxies commonly found in corporate environments. It does this by comparing the SSL intermediate certificate being used for your connection to the true/known SSL certificate for the server.
☆68Feb 9, 2018Updated 8 years ago
Alternatives and similar repositories for Detect-SSLmitm
Users that are interested in Detect-SSLmitm are comparing it to the libraries listed below
Sorting:
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ☆229May 10, 2018Updated 7 years ago
- SMB Relay Attack Script☆146Dec 6, 2018Updated 7 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago
- 504 VSAgent☆25Feb 21, 2018Updated 8 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Dec 10, 2022Updated 3 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- ☆53Oct 27, 2018Updated 7 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!)☆737Feb 5, 2019Updated 7 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Assorted scripts and one off things☆271Aug 20, 2024Updated last year
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- PowerShell Script to Dump Windows Credentials from the Credential Manager☆733Dec 12, 2017Updated 8 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,649Oct 11, 2018Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Domain Password Audit Tool for Pentesters☆1,027Dec 24, 2025Updated 2 months ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- Hide your Powershell script in plain sight. Bypass all Powershell security features☆1,308Aug 19, 2019Updated 6 years ago
- The project is designed as a file resource cloner. Metadata, including digital signature, is extracted from one file and injected into a…☆366Nov 19, 2024Updated last year