All MITM attacks in one place.
☆1,022Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for MITM-cheatsheet
Users that are interested in MITM-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,444Mar 2, 2026Updated 3 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,541Jan 18, 2026Updated 2 months ago
- pwning IPv4 via IPv6☆1,896Feb 20, 2024Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,463Oct 1, 2025Updated 5 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,805Jul 29, 2025Updated 7 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,807Sep 17, 2024Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,186Sep 29, 2025Updated 5 months ago
- Red Teaming Tactics and Techniques☆4,515Aug 22, 2024Updated last year
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆332Nov 21, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,168Sep 29, 2021Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,383Jan 26, 2026Updated last month
- Potentially dangerous files☆3,288Aug 25, 2025Updated 6 months ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆507Sep 23, 2025Updated 6 months ago
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆809Aug 28, 2022Updated 3 years ago
- List of Awesome Asset Discovery Resources☆2,429Jan 22, 2025Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆2,587Dec 31, 2025Updated 2 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,473Sep 22, 2024Updated last year
- Network Analysis Tool☆3,340Apr 10, 2023Updated 2 years ago
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,787Apr 26, 2024Updated last year
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,299Aug 15, 2024Updated last year
- ☆1,014Jan 22, 2022Updated 4 years ago
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- Maximizing BloodHound. Max is a good boy.☆532Apr 25, 2025Updated 10 months ago
- Notes about attacking Jenkins servers☆2,089Jul 10, 2024Updated last year
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,932Sep 23, 2022Updated 3 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- Active Directory ACL exploitation with BloodHound☆756Nov 18, 2021Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,924Nov 19, 2025Updated 4 months ago
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,894Jun 15, 2020Updated 5 years ago
- Active Directory information dumper via LDAP☆1,388Apr 6, 2025Updated 11 months ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆350Feb 21, 2026Updated last month
- A curated list of amazingly awesome Burp Extensions☆3,379Feb 17, 2026Updated last month
- SSH man-in-the-middle tool☆1,732Jul 2, 2021Updated 4 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,085Feb 25, 2026Updated 3 weeks ago