clr2of8 / Detect-SSLmitmLinks
This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such as the internet proxies commonly found in corporate environments. It does this by comparing the SSL intermediate certificate being used for your connection to the true/known SSL certificate for the server.
☆67Updated 7 years ago
Alternatives and similar repositories for Detect-SSLmitm
Users that are interested in Detect-SSLmitm are comparing it to the libraries listed below
Sorting:
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- ☆98Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Updated 5 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆70Updated 8 years ago
- A ton of helpful tools☆39Updated 4 years ago
- Powershell Empire Persistence finder☆120Updated 8 years ago
- ☆41Updated 7 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- lterm is a small script built to install a bash hook for full terminal logging.☆56Updated 9 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- ☆81Updated 6 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆37Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Updated 7 years ago
- ☆76Updated 7 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- ☆58Updated 5 years ago
- 504 VSAgent☆25Updated 7 years ago
- AWS S3 Bucket/Object Finder☆25Updated 8 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆70Updated 9 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Updated 7 years ago