A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
☆219Apr 26, 2022Updated 4 years ago
Alternatives and similar repositories for MITM_Intercept
Users that are interested in MITM_Intercept are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆625Mar 10, 2026Updated 2 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Jun 27, 2023Updated 2 years ago
- ☆27Sep 15, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆385Apr 16, 2022Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆258May 17, 2022Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 3 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆87Oct 31, 2023Updated 2 years ago
- OSED Practice binary☆26Nov 23, 2023Updated 2 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆490Feb 24, 2023Updated 3 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆430Jul 22, 2022Updated 3 years ago
- A tool for collecting RDP, web and VNC screenshots all in one place☆480Apr 3, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆19Oct 5, 2020Updated 5 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,079Feb 1, 2024Updated 2 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 11 months ago
- NTLM relaying for Windows made easy☆582Apr 25, 2023Updated 3 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆347Jan 22, 2025Updated last year
- ☆94May 14, 2022Updated 4 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Windows Oracle Database Attack Toolkit☆81Jul 30, 2022Updated 3 years ago
- XLL Phishing Tradecraft☆441May 24, 2022Updated 3 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆20Dec 9, 2021Updated 4 years ago
- Source Code Management Attack Toolkit☆229Sep 20, 2022Updated 3 years ago
- 修复通过FART dump下来的dex☆28Aug 1, 2020Updated 5 years ago
- C# havoc implant☆101Feb 12, 2023Updated 3 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- C# version of Powermad☆171Dec 5, 2023Updated 2 years ago
- The Frida based fuzzer all in one☆29Mar 13, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆246Aug 26, 2022Updated 3 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆61Aug 11, 2022Updated 3 years ago
- Framework for Kerberos relaying☆948May 29, 2022Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆148Jun 2, 2022Updated 3 years ago