Short guide to setup an intercepting ssh-mitm server with a single command
Advanced usage
Guide how to setup a man in the middle server for advanced security audits in large networks and special use cases
Port Forwarding
Introduction to port forwarding features of ssh-mitm
SSH Vurnabilities
Explanation of vulnerabilities related to the ssh protocol
Jump Hosts
SSH-MITM should not be used as jump host. This page describes alternatives and security considerations when operating a jump host

SSH-MITM proxy server is open source

and developed by the community. Be a part of this community and...