frostbits-security / MITM-cheatsheet
All MITM attacks in one place.
☆941Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for MITM-cheatsheet
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,678Updated last month
- pwning IPv4 via IPv6☆1,717Updated 9 months ago
- fully automated pentesting tool☆504Updated last year
- Mass scan IPs for vulnerable services☆1,026Updated 2 years ago
- Find exploits in local and online databases instantly☆1,645Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,019Updated last month
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,198Updated 2 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,666Updated last week
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,452Updated 2 years ago
- Some scripts useful for red team activities☆1,552Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,046Updated 2 weeks ago
- Automatic Enumeration Tool based in Open Source tools☆878Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,227Updated 3 years ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,194Updated 4 months ago
- Windows Privilege Escalation Techniques and Scripts☆794Updated 4 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 6 months ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆753Updated 4 years ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,018Updated 4 months ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,031Updated 5 months ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆388Updated 2 years ago
- Fetch, install and search wordlist archives from websites and torrent peers.☆495Updated 7 months ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,080Updated last year
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,531Updated last year
- Collection of Scripts for shodan searching stuff.☆1,068Updated this week
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆526Updated 3 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆427Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,228Updated 2 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆612Updated 3 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,796Updated 2 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,508Updated 3 months ago