grimm-co / mmeLinks
Man-in-the-middle made easy!
☆15Updated 5 years ago
Alternatives and similar repositories for mme
Users that are interested in mme are comparing it to the libraries listed below
Sorting:
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Presentation Slides and Resources☆16Updated last year
- ☆20Updated last year
- C# User Simulation☆32Updated 2 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated 11 months ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- ☆22Updated 4 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆25Updated 4 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- ☆16Updated 7 months ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- Network Finger Printer☆16Updated 7 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- Random Hashcat Scrips☆31Updated 10 months ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- various slides and presentations I've worked on☆19Updated 5 months ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated 2 years ago