Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire
☆21Apr 9, 2025Updated 10 months ago
Alternatives and similar repositories for docker-mitm
Users that are interested in docker-mitm are comparing it to the libraries listed below
Sorting:
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆16Jul 7, 2022Updated 3 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 4 months ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last week
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆48May 12, 2021Updated 4 years ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆63May 31, 2020Updated 5 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- A set of helper scripts, to be used with jlib to help parsing domains.☆27Oct 21, 2020Updated 5 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- ☆35Mar 19, 2022Updated 3 years ago
- ☆139Mar 29, 2023Updated 2 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆81Mar 30, 2023Updated 2 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- Payload Obfuscation for Red Teams workshop materials☆78Nov 25, 2025Updated 3 months ago
- OWASP Foundation Web Respository☆36Sep 1, 2021Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Password spraying tool and Bloodhound integration☆248Dec 31, 2024Updated last year
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- A small script to automate project folder management and basic tool output☆34May 14, 2020Updated 5 years ago