ssh-mitm VS Metasploit

Compare ssh-mitm vs Metasploit and see what are their differences.

Our great sponsors
  • WorkOS - The modern identity platform for B2B SaaS
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • SaaSHub - Software Alternatives and Reviews
ssh-mitm Metasploit
2 117
1,581 32,790
- 1.3%
0.0 10.0
almost 3 years ago 3 days ago
C Ruby
GNU General Public License v3.0 or later GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ssh-mitm

Posts with mentions or reviews of ssh-mitm. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-10-06.
  • Awesome Penetration Testing
    124 projects | dev.to | 6 Oct 2021
    SSH MITM - Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
  • Which tool to use for SSH man in the middle attacks
    2 projects | news.ycombinator.com | 7 Jun 2021
    Hello,

    at my university, we are learning, how to use ssh for server administration.

    We learned, that ssh is secure, but there are some tools, which allows man in the middle attacks on ssh.

    I found following tools:

    * https://github.com/jtesta/ssh-mitm - most starred, but uses an outdated OpenSSH version and it's complicated to setup :-(

Metasploit

Posts with mentions or reviews of Metasploit. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-02-01.

What are some alternatives?

When comparing ssh-mitm and Metasploit you can also consider the following projects:

mitm-omegle - Watch strangers talk on Omegle (man in the middle attack explained for kids)

BeEF - The Browser Exploitation Framework Project

pyrdp - RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact

Covenant - Covenant is a collaborative .NET C2 framework for red teamers.

sftpretty - Provides multi-threaded routines and high level protocol abstractions for a pretty quick & simple file transfer experience. Drop in replacement for pysftp.

routersploit - Exploitation Framework for Embedded Devices [Moved to: https://github.com/threat9/routersploit]

aws-gate - Better AWS SSM Session manager CLI client

SQLMap - Automatic SQL injection and database takeover tool

docker-sshd - Minimal Alpine Linux Docker image with sshd exposed and rsync installed

bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.

SSLproxy - Transparent SSL/TLS proxy for decrypting and diverting network traffic to other programs, such as UTM services, for deep SSL inspection

Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications