☆108Nov 7, 2024Updated last year
Alternatives and similar repositories for mail-in-the-middle
Users that are interested in mail-in-the-middle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- Script to perform some hashcracking logic automagically☆82Nov 12, 2025Updated 4 months ago
- DPAPI looting remotely and locally in Python☆545Mar 13, 2026Updated 3 weeks ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- ☆569Mar 28, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Enumerate Microsoft Entra ID (Azure AD) fast☆112Jan 26, 2026Updated 2 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆185Feb 12, 2023Updated 3 years ago
- ☆124May 12, 2021Updated 4 years ago
- ☆122Nov 21, 2024Updated last year
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆260May 10, 2023Updated 2 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆151May 3, 2024Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆102Sep 5, 2024Updated last year
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago
- ☆221Mar 26, 2024Updated 2 years ago
- Okta Verify and Okta FastPass Abuse Tool☆341Sep 4, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- ☆15Feb 9, 2022Updated 4 years ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Get Fine Grained Password Policy☆78Mar 13, 2026Updated 3 weeks ago
- Beacon Object Files for roasting Active Directory☆237Feb 21, 2022Updated 4 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,844Nov 3, 2024Updated last year
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Dump NTDS with golden certificates and UnPAC the hash☆646Mar 20, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆702May 7, 2025Updated 11 months ago
- ☆60Oct 24, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆416Mar 21, 2025Updated last year
- Extracting NetNTLM without touching lsass.exe☆244Nov 27, 2023Updated 2 years ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆171Nov 26, 2023Updated 2 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,068Mar 1, 2026Updated last month