Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks
☆42Oct 22, 2020Updated 5 years ago
Alternatives and similar repositories for CanaryPi
Users that are interested in CanaryPi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆56May 13, 2020Updated 5 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- Monitors the network for new connected MAC addresses☆17Dec 10, 2022Updated 3 years ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆303Mar 19, 2026Updated last month
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- IDA plugin for automatic deobfuscation of opaque predicates by lifting microcode to z3 for SMT reasoning.☆53Updated this week
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- Respounder detects presence of responder in the network.☆323Jun 15, 2019Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆262Feb 9, 2026Updated 2 months ago
- PowerShell script to get domain mail info and control status such as MX, SPF, DKIM, DMARC and StartTLS.☆12May 20, 2025Updated 11 months ago
- Comprehensive parsing script for grepable Nmap output files. Provides a summary table, split hosts files, and URLs for web and SMB hosts.☆19Apr 17, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆19Dec 18, 2024Updated last year
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated last year
- ATTPwn☆220Mar 9, 2024Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆93Jul 30, 2025Updated 9 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 10 months ago
- Jaseem's dotfiles☆16Apr 27, 2026Updated last week
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆108Apr 15, 2026Updated 2 weeks ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Extensible MacOS system telemetry generator.☆56Apr 12, 2026Updated 3 weeks ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files an…☆26Dec 19, 2023Updated 2 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 2 months ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆13Apr 25, 2019Updated 7 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Protocol agnostic online password guessing API.☆85Mar 8, 2023Updated 3 years ago
- small operating system☆11Apr 30, 2021Updated 5 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,289Nov 15, 2025Updated 5 months ago
- Reports in .MD format☆22Jul 8, 2025Updated 9 months ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago