clr2of8 / Detect-SSLmitmLinks
This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such as the internet proxies commonly found in corporate environments. It does this by comparing the SSL intermediate certificate being used for your connection to the true/known SSL certificate for the server.
☆68Updated 7 years ago
Alternatives and similar repositories for Detect-SSLmitm
Users that are interested in Detect-SSLmitm are comparing it to the libraries listed below
Sorting:
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆70Updated 8 years ago
- ☆98Updated 6 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 9 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Updated 5 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Updated 11 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆56Updated 9 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆56Updated last year
- ☆80Updated 6 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- ☆41Updated 7 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- 504 VSAgent☆25Updated 7 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 7 years ago
- Pypykatz agent implemented in .NET☆84Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 7 years ago
- ☆76Updated 7 years ago
- The documents☆56Updated 8 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- A ton of helpful tools☆39Updated 4 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆69Updated 7 years ago
- ☆58Updated 5 years ago