Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire
☆21Apr 9, 2025Updated 11 months ago
Alternatives and similar repositories for docker-mitm
Users that are interested in docker-mitm are comparing it to the libraries listed below
Sorting:
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆50May 12, 2021Updated 4 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Jan 10, 2026Updated 2 months ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- ☆35Mar 19, 2022Updated 4 years ago
- ☆14Sep 8, 2024Updated last year
- XRDP Server for GUI Inside Docker Container☆12Mar 18, 2024Updated 2 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 4 months ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- Generates Theos projects based on a template.☆13Dec 2, 2025Updated 3 months ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last month
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Offensive RPC PoC☆89Sep 29, 2021Updated 4 years ago
- ☆13Apr 14, 2024Updated last year
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains.…☆21Dec 29, 2023Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Tool for downloading the Greenbone Community Feed☆25Mar 16, 2026Updated last week