Detect and log CVE-2019-19781 scan and exploitation attempts.
☆118Jan 15, 2020Updated 6 years ago
Alternatives and similar repositories for CitrixHoneypot
Users that are interested in CitrixHoneypot are comparing it to the libraries listed below
Sorting:
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Nov 23, 2018Updated 7 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51May 1, 2023Updated 2 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- High Interaction Honeypot Solution for Redis protocol☆25Apr 23, 2021Updated 4 years ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Jun 19, 2021Updated 4 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Apr 12, 2022Updated 3 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- a low-interaction honeypot☆95Jun 4, 2017Updated 8 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆75Dec 8, 2019Updated 6 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- A collection of tools for dealing with TrickBot☆203Nov 11, 2017Updated 8 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- THP Forensic Challenges☆23Jul 28, 2023Updated 2 years ago
- Kubernetes Ingress and Service monitoring of HTTP/HTTPS requests☆21Apr 19, 2020Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- OFFICE DDEAUTO Payload Generation script☆128Dec 19, 2020Updated 5 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Nov 20, 2019Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆13Oct 21, 2022Updated 3 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 9 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- Vaccine for STOP/DJVU ransomware, prevents encryption☆26Oct 30, 2025Updated 4 months ago
- Endpoint detection & Malware analysis software☆230Dec 20, 2019Updated 6 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Sep 11, 2021Updated 4 years ago
- Repository for my ATT&CK analysis research.☆71May 16, 2019Updated 6 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago