network-protocol-attacks
yaklang/hack-skills
This comprehensive playbook details advanced techniques for exploiting Layer 2 and Layer 3 network protocols. It covers attacks such as ARP spoofing, LLMNR/mDNS poisoning, WPAD abuse, DHCPv6 takeover, VLAN hopping, and STP manipulation. Designed for penetration testers, it facilitates MitM positioning, credential harvesting (NTLM relay), and robust network environment exploitation.