0xsha / sweetie-data
This repo contains logstash of various honeypots
☆174Updated 5 years ago
Alternatives and similar repositories for sweetie-data:
Users that are interested in sweetie-data are comparing it to the libraries listed below
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- AI-based, context-driven network device ranking☆297Updated last year
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 4 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆236Updated 2 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- penetration testing scripts☆136Updated 5 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆162Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories.☆86Updated 5 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆159Updated 5 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- LinkedIn reconnaissance tool☆51Updated 3 years ago
- Main Build directory☆179Updated 5 years ago
- GreyNoise Query Language☆82Updated 5 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆249Updated last month
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆114Updated 5 years ago