clr2of8 / Detect-SSLmitmLinks
This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such as the internet proxies commonly found in corporate environments. It does this by comparing the SSL intermediate certificate being used for your connection to the true/known SSL certificate for the server.
☆68Updated 7 years ago
Alternatives and similar repositories for Detect-SSLmitm
Users that are interested in Detect-SSLmitm are comparing it to the libraries listed below
Sorting:
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Updated 8 years ago
- ☆98Updated 6 years ago
- ☆76Updated 7 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- Powershell Empire Persistence finder☆119Updated 9 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Updated 9 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- ☆80Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 7 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated 2 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- Reconnaissance tool for Microsoft Office 365☆69Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- Conveigh is a Windows PowerShell LLMNR/NBNS spoofer detection tool☆97Updated 9 years ago
- ☆41Updated 7 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 9 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Updated 8 years ago
- 504 VSAgent☆25Updated 7 years ago
- Responsive Command and Control System☆102Updated 3 years ago
- A ton of helpful tools☆39Updated 4 years ago