0x4D31 / awesome-honeypots
an awesome list of honeypot resources
☆8Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-honeypots
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- only for 31337☆21Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Scripts for OSCE☆18Updated 5 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 5 years ago
- Small and highly portable detection tests.☆11Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Updated 4 years ago
- Hashes of infamous malware☆26Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- buffer overflow examples☆21Updated 6 years ago
- ☆34Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- ☆15Updated last year
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago