0x6d6f7468 / honeybadgerView external linksLinks
☆21Jul 29, 2019Updated 6 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below
Sorting:
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- The "Virtual Whale" OSINT CTF at BSides DFW 2019!☆22Nov 2, 2019Updated 6 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆17Nov 26, 2025Updated 2 months ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- A bunch of scripts I use to work with urlscan.io☆35Oct 25, 2019Updated 6 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- OSCP guide and Red Team assessment Guide☆37Jul 9, 2020Updated 5 years ago
- Web Application Firewall (WAF) Enhanced with AI through Autonomous Dynamic Learning and Generative Models☆14Nov 21, 2024Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- ☆10Nov 15, 2020Updated 5 years ago
- My stuff regarding Copilot for Security☆12Jan 12, 2026Updated last month
- ☆10Jul 1, 2023Updated 2 years ago
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- A Search command to explore Elasticsearch data within Splunk.☆40Sep 14, 2018Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- ☆12Apr 20, 2025Updated 9 months ago
- PowerShell scripts to facilitate Cross-Tenant migrations!☆12Aug 10, 2023Updated 2 years ago
- A powershell script for creating a Windows honeyport.☆12Jun 24, 2015Updated 10 years ago
- ☆13Jan 24, 2025Updated last year
- One command to update all your repos☆10Feb 24, 2024Updated last year
- ☆10Jan 14, 2022Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- A simple lyrics editor (generator and organizer as well) for .LRC files.☆11Oct 27, 2023Updated 2 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- ☆13Feb 18, 2022Updated 3 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- ☆12Feb 9, 2025Updated last year
- ☆11Apr 2, 2022Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- LinkedIn reconnaissance tool☆11Dec 29, 2019Updated 6 years ago