clr2of8 / Detect-SSLmitmLinks
This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such as the internet proxies commonly found in corporate environments. It does this by comparing the SSL intermediate certificate being used for your connection to the true/known SSL certificate for the server.
☆67Updated 7 years ago
Alternatives and similar repositories for Detect-SSLmitm
Users that are interested in Detect-SSLmitm are comparing it to the libraries listed below
Sorting:
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- ☆59Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 10 years ago
- PowerShell Empire docker build☆23Updated 8 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 5 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- ☆76Updated 7 years ago
- ☆59Updated 4 years ago
- 504 VSAgent☆23Updated 7 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆54Updated 6 months ago
- ☆98Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆71Updated 8 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆45Updated 7 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago
- Pypykatz agent implemented in .NET☆86Updated 6 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Updated 6 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 10 months ago
- Implementing Kerberoast attack fully in python☆72Updated 6 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆55Updated 8 years ago
- Powershell Persistence Locator☆66Updated 8 years ago