clr2of8 / Detect-SSLmitm
This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such as the internet proxies commonly found in corporate environments. It does this by comparing the SSL intermediate certificate being used for your connection to the true/known SSL certificate for the server.
☆67Updated 7 years ago
Alternatives and similar repositories for Detect-SSLmitm:
Users that are interested in Detect-SSLmitm are comparing it to the libraries listed below
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆66Updated 6 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- ☆97Updated 6 years ago
- ☆17Updated 7 years ago
- 504 VSAgent☆23Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆73Updated 5 years ago
- Password spraying script and helper for creating password lists☆34Updated 4 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- ☆76Updated 6 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- Powershell Empire Persistence finder☆119Updated 8 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 7 years ago
- A ton of helpful tools☆39Updated 3 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Updated last year
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- ☆55Updated 4 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆56Updated 5 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 6 years ago
- Automated enumeration☆30Updated 3 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- nmapParser.py is a tool developed for consultants doing nmap scans against a large range of hosts. I found it easy to identify hosts that…☆13Updated 9 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- This is a simple parser for/decrypter for Impacket's esentutl.py utility. It assists with decrypting hashes and hash histories from ntds.…☆71Updated 8 years ago
- ☆33Updated 2 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆120Updated 4 years ago
- CloudBurst is a red team framework for interacting with cloud providers to capture, compromise, and exfil data.☆36Updated 6 years ago