0xsha / sweetie-data
This repo contains logstash of various honeypots
☆174Updated 5 years ago
Alternatives and similar repositories for sweetie-data:
Users that are interested in sweetie-data are comparing it to the libraries listed below
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 3 years ago
- AI-based, context-driven network device ranking☆295Updated last year
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Code + documentation for the public GreyNoise API☆314Updated 3 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Proofs of Concept. Just fucking around.☆194Updated 2 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- A malware analysis and classification tool.☆191Updated 3 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆114Updated 5 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆155Updated 2 years ago
- penetration testing scripts☆136Updated 5 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- a CLI for ephemeral penetration testing☆12Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Resolvn Threat Hunting Virtual Machine☆138Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Internet data acquisition☆149Updated 4 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆247Updated this week
- GreyNoise Query Language☆82Updated 5 years ago
- ☆138Updated 6 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- Searches For Threat Hunting and Security Analytics☆241Updated 3 years ago
- Respounder detects presence of responder in the network.☆315Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Cisco Implant Raspberry Controlled Operations☆51Updated last year
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago