sensepost / mail-in-the-middleLinks
☆109Updated 9 months ago
Alternatives and similar repositories for mail-in-the-middle
Users that are interested in mail-in-the-middle are comparing it to the libraries listed below
Sorting:
- C2 Automation using Linode☆84Updated 2 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆115Updated last week
- ☆80Updated 3 weeks ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- ☆160Updated last year
- Updated version of PowerDNS by @domchell. Adds support for transfers over DNS A records and a few other useful features.☆84Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 6 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 11 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆65Updated 3 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Deploy a phishing infrastructure on the fly.☆74Updated 8 months ago
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A little cheatsheet for NetExec☆24Updated last year
- Covert data exfiltration via DNS☆48Updated 6 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 10 months ago
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- Discord C2 Profile for Mythic☆32Updated 6 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆56Updated 3 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆83Updated 11 months ago
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 8 months ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆176Updated 2 years ago
- ☆58Updated 9 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 6 months ago