A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
☆218Apr 26, 2022Updated 3 years ago
Alternatives and similar repositories for MITM_Intercept
Users that are interested in MITM_Intercept are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools☆283Sep 18, 2025Updated 6 months ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆622Mar 10, 2026Updated 2 weeks ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- ☆27Sep 15, 2021Updated 4 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆384Apr 16, 2022Updated 3 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Fully modular persistence framework☆259Apr 10, 2023Updated 2 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Oct 31, 2023Updated 2 years ago
- OSED Practice binary☆25Nov 23, 2023Updated 2 years ago
- Nim-based assembly packer and shellcode loader for opsec & profit☆488Feb 24, 2023Updated 3 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Feb 4, 2021Updated 5 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆430Jul 22, 2022Updated 3 years ago
- A tool for collecting RDP, web and VNC screenshots all in one place☆482Apr 3, 2023Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,080Feb 1, 2024Updated 2 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 9 months ago
- NTLM relaying for Windows made easy☆581Apr 25, 2023Updated 2 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆345Jan 22, 2025Updated last year
- ☆94May 14, 2022Updated 3 years ago
- ☆11Jul 14, 2020Updated 5 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Windows Oracle Database Attack Toolkit☆80Jul 30, 2022Updated 3 years ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆20Dec 9, 2021Updated 4 years ago
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- Source Code Management Attack Toolkit☆225Sep 20, 2022Updated 3 years ago
- 修复通过FART dump下来的dex☆29Aug 1, 2020Updated 5 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Feb 14, 2022Updated 4 years ago
- C# version of Powermad☆169Dec 5, 2023Updated 2 years ago
- A basic C2 Framework with an internet explorer based agent☆16Aug 18, 2021Updated 4 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆244Aug 26, 2022Updated 3 years ago
- The Frida based fuzzer all in one☆30Mar 13, 2021Updated 5 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆307Jan 6, 2023Updated 3 years ago
- Android ARM & ARM64 Debugger based on Unicorn and Frida☆60Aug 11, 2022Updated 3 years ago
- Framework for Kerberos relaying☆939May 29, 2022Updated 3 years ago