All MITM attacks in one place.
☆1,028Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for MITM-cheatsheet
Users that are interested in MITM-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,481Mar 2, 2026Updated 2 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,662Aug 28, 2025Updated 8 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,603Jan 18, 2026Updated 3 months ago
- pwning IPv4 via IPv6☆1,906Feb 20, 2024Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,476Oct 1, 2025Updated 7 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,812Apr 6, 2026Updated last month
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,821Jul 29, 2025Updated 9 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,290Sep 29, 2025Updated 7 months ago
- Red Teaming Tactics and Techniques☆4,582Aug 22, 2024Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆508Sep 23, 2025Updated 7 months ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆332Nov 21, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,174Sep 29, 2021Updated 4 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,442Jan 26, 2026Updated 3 months ago
- Potentially dangerous files☆3,299Aug 25, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆9,126Dec 6, 2023Updated 2 years ago
- List of Awesome Asset Discovery Resources☆2,486Jan 22, 2025Updated last year
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆814Aug 28, 2022Updated 3 years ago
- Identifies the bytes that Microsoft Defender flags on.☆2,607Dec 31, 2025Updated 4 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,481Sep 22, 2024Updated last year
- Maximizing BloodHound. Max is a good boy.☆533Apr 25, 2025Updated last year
- Network Analysis Tool☆3,353Apr 10, 2023Updated 3 years ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆363Feb 21, 2026Updated 2 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,799Apr 26, 2024Updated 2 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,302Aug 15, 2024Updated last year
- ☆1,011Jan 22, 2022Updated 4 years ago
- Notes about attacking Jenkins servers☆2,093Jul 10, 2024Updated last year
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆762Sep 23, 2024Updated last year
- ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the…☆1,911Jun 15, 2020Updated 5 years ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,940Sep 23, 2022Updated 3 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Jun 6, 2019Updated 6 years ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,278Apr 23, 2026Updated 2 weeks ago
- Active Directory ACL exploitation with BloodHound☆761Nov 18, 2021Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,956Nov 19, 2025Updated 5 months ago
- Active Directory information dumper via LDAP☆1,400Apr 6, 2025Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,392Feb 17, 2026Updated 2 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,134Apr 19, 2026Updated 2 weeks ago