mubix / InterceptorLinks
PowerShell HTTP(s) Intercepting Proxy
☆14Updated 10 years ago
Alternatives and similar repositories for Interceptor
Users that are interested in Interceptor are comparing it to the libraries listed below
Sorting:
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- ☆53Updated 10 years ago
- Mainframe bruter and screen automation utility.☆20Updated 3 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- Network Mapping and Enumeration Framework☆22Updated 9 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Custom scripts released for BSidesDC 2016☆14Updated 8 years ago
- EmPyre Web Interface☆12Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- MS15-076 Privilege Escalation☆16Updated 9 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆46Updated 8 years ago
- ☆23Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- PowerShell Runspace Connect-Back Shell☆26Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ☆23Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- \ PowerAvails Powershell /☆12Updated 7 years ago
- Decrypt NTDS hashes☆23Updated 11 years ago
- ☆17Updated 7 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Nano meterpreter shell based on TinyMet☆27Updated 8 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago