frostbits-security / MITM-cheatsheet
All MITM attacks in one place.
☆975Updated 3 years ago
Alternatives and similar repositories for MITM-cheatsheet
Users that are interested in MITM-cheatsheet are comparing it to the libraries listed below
Sorting:
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,710Updated 7 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,303Updated 4 months ago
- Metasploit Cheat Sheet 💣☆430Updated 5 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,734Updated 3 months ago
- Windows Privilege Escalation Techniques and Scripts☆869Updated 5 years ago
- offsec batteries included☆1,560Updated last year
- Find exploits in local and online databases instantly☆1,733Updated 3 years ago
- The Shadow Attack Framework☆1,105Updated 2 years ago
- pwning IPv4 via IPv6☆1,786Updated last year
- Red Team Tool Kit☆1,116Updated 2 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,243Updated this week
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,305Updated 7 months ago
- Metasploit custom modules, plugins, resource script and.. awesome metasploit collection☆394Updated 2 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆1,344Updated 2 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆624Updated 3 months ago
- Collection of Scripts for shodan searching stuff.☆1,101Updated 5 months ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,049Updated 11 months ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆2,104Updated 3 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,535Updated 8 months ago
- Steal Net-NTLM Hash using Bad-PDF☆1,105Updated 4 years ago
- Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribut…☆535Updated 3 years ago
- Mass scan IPs for vulnerable services☆1,032Updated 3 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,159Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,057Updated 8 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,617Updated 5 months ago
- Image Payload Creating/Injecting tools☆1,235Updated last year
- Basics on commands/tools/info on how to assess the security of mobile applications☆1,557Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,864Updated 2 years ago
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆801Updated 2 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆475Updated 4 years ago