CommunityHoneyNetwork / rdphoneyLinks
Basic RDP honeypot script
☆32Updated 2 years ago
Alternatives and similar repositories for rdphoney
Users that are interested in rdphoney are comparing it to the libraries listed below
Sorting:
- CVE2020-0796 SMBv3 RCE☆61Updated 5 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- Smart overlay for Cobalt Strike PS function☆31Updated 6 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- A forensic evidence acquirer☆86Updated 4 years ago
- Automated 802.1x Bypass☆86Updated 5 years ago
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆13Updated 3 years ago
- Simple web shell scanner written in Golang.☆90Updated 6 years ago
- Tracking APT IOCs☆25Updated 4 years ago
- ☆50Updated 4 years ago
- Sources code extracted from malwares for analysis☆37Updated 2 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Updated 2 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Bro integration with osquery☆15Updated 2 years ago
- Proxy Unix applications in the terminal☆114Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- ☆54Updated 6 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆49Updated 4 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Updated 5 years ago
- QuasarRAT analysis tools and research report☆27Updated last year
- Carbon Black Response IR tool☆53Updated 4 years ago
- initial commit☆44Updated 7 months ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆61Updated 6 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆53Updated 6 years ago
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago