
Top picks: Burp Suite Professional, xsshunter_client, SauronEye — plus 45 more compared.
Vulnerability ManagementSSH MITM v2.3-dev is a free Penetration Testing tool. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to SSH MITM v2.3-dev, including their key features and shared capabilities.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.
Open-source Java application for creating proxies for traffic analysis & modification.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.
Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.
SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.
Intercepts and examines mobile app connections by stripping SSL/TLS layer.
Open-source Java application for creating proxies for traffic analysis & modification.
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.
A WebSocket Manipulation Proxy with a user interface to capture, intercept, and send custom messages for WebSocket and Socket.IO communications.
Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.
SQLi-Hunter is an HTTP/HTTPS proxy server and SQLMAP API wrapper that simplifies the identification and exploitation of SQL injection vulnerabilities in web applications.
Shadow Workers is an open source C2 framework and proxy tool for penetration testers to exploit XSS vulnerabilities and malicious Service Workers.
A tool to easily automate and multithread your pentesting and bug bounty workflow without any coding
AI-powered autonomous penetration testing platform with multi-agent system
AI-powered automated penetration testing platform for vulnerability discovery
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
Human-guided continuous pentesting platform with attack surface management
AI-powered automated pen testing & continuous red teaming platform
Pentest management platform for reporting, project mgmt & client collaboration
Pentest reporting & exposure mgmt platform for vulnerability remediation
Automated pentesting for web apps & APIs with continuous vulnerability scanning
Penetration testing software for simulating attacks and validating vulnerabilities
Automated internal network penetration testing and security validation platform
Continuous pentesting service monitoring web apps & APIs for code changes
AI-powered automated penetration testing platform for web apps and networks
AI-powered automated penetration testing platform for on-demand security audits
AI-powered autonomous pentesting platform for continuous security validation
Modular offensive security platform for continuous monitoring and testing
AI-native multi-agent pentesting engine for autonomous vulnerability discovery
AI-driven autonomous pentesting platform for continuous vulnerability discovery
Continuous automated pentesting platform for ongoing security assessment
Autonomous AI system for continuous penetration testing and exploit validation
Cloud-based penetration testing platform for threat mgmt & remediation
Managed continuous penetration testing service for internal & external networks
Autonomous penetration testing platform identifying attack paths & vulnerabilities
Automated network penetration testing tool for internal and external attacks
Continuous pentesting platform with autonomous AI agents for web apps and APIs
AI-powered continuous pentesting platform with agentic automation
AI-powered pentest & VMDR platform for vulnerability scanning & management
AI-driven pentesting platform with white hat hacker community support
Autonomous pentesting platform for internal, external, cloud & K8s testing
Autonomous pentesting platform for data exfiltration testing & validation
AI-powered autonomous vulnerability hunter with CLI and platform interfaces
Pentest engagement management platform with continuous testing & real-time reporting.
PTaaS platform for managing pentests, DAST, and attack surface monitoring.
Pen testing platform with guided automation and certified exploit library.
Common questions security professionals ask when evaluating alternatives and competitors to SSH MITM v2.3-dev.
The most popular alternatives to SSH MITM v2.3-dev include Burp Suite Professional, xsshunter_client, SauronEye, MITM SOCKS Proxy for Java, and PETEP (PEnetration TEsting Proxy). These Penetration Testing tools offer similar capabilities and are frequently compared by security professionals evaluating their options.