☆108Nov 7, 2024Updated last year
Alternatives and similar repositories for mail-in-the-middle
Users that are interested in mail-in-the-middle are comparing it to the libraries listed below
Sorting:
- DPAPI looting remotely and locally in Python☆542Oct 7, 2025Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆32Mar 8, 2025Updated last year
- ☆568Mar 28, 2024Updated last year
- ☆124May 12, 2021Updated 4 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆101Sep 5, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Enumerate Microsoft Entra ID (Azure AD) fast☆104Jan 26, 2026Updated last month
- TokenCert☆102Nov 15, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- a tool to help operate in EDRs' blind spots☆766Dec 2, 2024Updated last year
- ☆15Feb 9, 2022Updated 4 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆258May 10, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Okta Verify and Okta FastPass Abuse Tool☆340Sep 4, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- ☆21Feb 27, 2021Updated 5 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 4 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,823Nov 3, 2024Updated last year
- ↕️🤫 Stealth redirector for your red team operation security☆1,067Mar 1, 2026Updated last week
- ☆215Mar 26, 2024Updated last year
- Indirect Syscalls: HellsGate in Nim, but making sure that all syscalls go through NTDLL (as in RecycledGate).☆184Feb 12, 2023Updated 3 years ago
- Beacon Object Files for roasting Active Directory☆235Feb 21, 2022Updated 4 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆412Mar 21, 2025Updated 11 months ago
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆701May 7, 2025Updated 10 months ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆731Sep 3, 2025Updated 6 months ago
- Generate droppers with encrypted payloads automatically.☆54Nov 16, 2021Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆311Feb 16, 2026Updated 3 weeks ago