phackt / mitmLinks
Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)
☆19Updated 5 years ago
Alternatives and similar repositories for mitm
Users that are interested in mitm are comparing it to the libraries listed below
Sorting:
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- SkyRAT - Powershell Remote Administration Tool☆33Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- ☆17Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- ☆25Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Random stuff☆16Updated 7 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Updated 10 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 7 years ago
- Raw syscall implementations with Powershell☆30Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆29Updated 4 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago