CanadianJeff / honeywrtLinks
☆21Updated 9 years ago
Alternatives and similar repositories for honeywrt
Users that are interested in honeywrt are comparing it to the libraries listed below
Sorting:
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- OpenDNS Graph Miner☆45Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- A warehouse for your malware☆134Updated 12 years ago
- VirusTotal tools☆91Updated 4 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆22Updated 2 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 9 months ago
- Cryptowall Tooling & Information☆35Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- ☆50Updated 9 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 4 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- REST API based malware repository (abandoned)☆107Updated 10 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Rogue AP killer☆90Updated 7 years ago
- Incident Response Scripts☆30Updated 5 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 6 months ago