Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire
☆21Apr 9, 2025Updated last year
Alternatives and similar repositories for docker-mitm
Users that are interested in docker-mitm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- Electron based screenshot scanner☆68Feb 4, 2023Updated 3 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Mar 26, 2026Updated 2 weeks ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- ☆34Mar 19, 2022Updated 4 years ago
- ☆14Sep 8, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- XRDP Server for GUI Inside Docker Container☆12Mar 18, 2024Updated 2 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆14Apr 16, 2023Updated 2 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Threat Mitigation Strategies☆29Feb 18, 2026Updated last month
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆15Jul 7, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated 2 months ago
- Password spraying tool and Bloodhound integration☆259Mar 26, 2026Updated 2 weeks ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Mar 21, 2026Updated 3 weeks ago
- ☆13Apr 14, 2024Updated last year
- A tool for performing an initial information-gathering scan of websites for penetration tests.☆24Aug 27, 2019Updated 6 years ago
- HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains.…☆21Dec 29, 2023Updated 2 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 3 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Jun 23, 2019Updated 6 years ago
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆26May 16, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆16Oct 16, 2024Updated last year
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago