0x4D31 / honeykuLinks
A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
☆65Updated 6 years ago
Alternatives and similar repositories for honeyku
Users that are interested in honeyku are comparing it to the libraries listed below
Sorting:
- ☆46Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- ☆11Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- ☆27Updated 7 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- Python wrapper for the Mitre ATT&CK framework API☆31Updated 7 years ago
- ☆25Updated 4 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 8 years ago