All MITM attacks in one place.
☆1,019Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for MITM-cheatsheet
Users that are interested in MITM-cheatsheet are comparing it to the libraries listed below
Sorting:
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,432Jan 13, 2026Updated last month
- Automation for internal Windows Penetrationtest / AD-Security☆3,644Aug 28, 2025Updated 6 months ago
- Wiki to collect Red Team infrastructure hardening resources☆4,450Oct 1, 2025Updated 5 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,803Sep 17, 2024Updated last year
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,799Jul 29, 2025Updated 7 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 5 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,167Sep 29, 2021Updated 4 years ago
- pwning IPv4 via IPv6☆1,888Feb 20, 2024Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 5 months ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- List of Awesome Asset Discovery Resources☆2,370Jan 22, 2025Updated last year
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,353Jan 26, 2026Updated last month
- Red Teaming Tactics and Techniques☆4,495Aug 22, 2024Updated last year
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆345Feb 21, 2026Updated last week
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆332Nov 21, 2020Updated 5 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,582Dec 31, 2025Updated 2 months ago
- Network Analysis Tool☆3,332Apr 10, 2023Updated 2 years ago
- Maximizing BloodHound. Max is a good boy.☆531Apr 25, 2025Updated 10 months ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,301Aug 15, 2024Updated last year
- Active Directory ACL exploitation with BloodHound☆755Nov 18, 2021Updated 4 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆864Mar 20, 2023Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,466Sep 22, 2024Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Payload Generation Framework☆1,972Aug 21, 2024Updated last year
- Search for potential frontable domains☆644Mar 22, 2023Updated 2 years ago
- Potentially dangerous files☆3,274Aug 25, 2025Updated 6 months ago
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆614Aug 15, 2025Updated 6 months ago
- Notes about attacking Jenkins servers☆2,090Jul 10, 2024Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,232Dec 27, 2023Updated 2 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,727Jan 16, 2026Updated last month
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,888Jun 15, 2020Updated 5 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,932Sep 23, 2022Updated 3 years ago