A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
☆217Apr 26, 2022Updated 3 years ago
Alternatives and similar repositories for MITM_Intercept
Users that are interested in MITM_Intercept are comparing it to the libraries listed below
Sorting:
- Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools☆282Sep 18, 2025Updated 5 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- ☆15Apr 20, 2022Updated 3 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆385Apr 16, 2022Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- XLL Phishing Tradecraft☆439May 24, 2022Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Oct 31, 2023Updated 2 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆345Jan 22, 2025Updated last year
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- NTLM relaying for Windows made easy☆580Apr 25, 2023Updated 2 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆429Jul 22, 2022Updated 3 years ago
- Source Code Management Attack Toolkit☆226Sep 20, 2022Updated 3 years ago
- A tool for converting SysWhispers3 syscalls for use with Nim projects☆147Jun 2, 2022Updated 3 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆20Dec 9, 2021Updated 4 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- A tool for collecting RDP, web and VNC screenshots all in one place☆482Apr 3, 2023Updated 2 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- ☆18Jan 9, 2025Updated last year
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Mar 6, 2025Updated 11 months ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- Transfer files to and from a Windows host via ICMP in restricted network environments.☆330Jan 27, 2022Updated 4 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- ☆523Jun 5, 2023Updated 2 years ago
- ☆252Sep 28, 2023Updated 2 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆572Mar 28, 2024Updated last year
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- RPC Monitor tool based on Event Tracing for Windows☆384Aug 19, 2024Updated last year
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 3 years ago
- Framework for Kerberos relaying☆937May 29, 2022Updated 3 years ago
- Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!☆1,303Updated this week
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago