OWASP Honeypot, Automated Deception Framework.
☆476Sep 15, 2024Updated last year
Alternatives and similar repositories for Python-Honeypot
Users that are interested in Python-Honeypot are comparing it to the libraries listed below
Sorting:
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆4,843Feb 23, 2026Updated last week
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆303Oct 6, 2023Updated 2 years ago
- 30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, ms…☆948Dec 3, 2025Updated 2 months ago
- Advanced Honeypot framework.☆1,295Oct 9, 2023Updated 2 years ago
- Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.o…☆1,928Feb 16, 2026Updated 2 weeks ago
- Web Application Honeypot☆596Jul 23, 2024Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 9 months ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- an awesome list of honeypot resources☆10,176Apr 1, 2025Updated 11 months ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,243Feb 18, 2026Updated last week
- 19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS…☆826Aug 8, 2023Updated 2 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆653Mar 14, 2024Updated last year
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Jun 30, 2023Updated 2 years ago
- 🍯 T-Pot - The All In One Multi Honeypot Platform 🐝☆8,797Jan 29, 2026Updated last month
- Open Source Vulnerability Management Platform☆6,266Feb 13, 2026Updated 2 weeks ago
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,073Jun 7, 2024Updated last year
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,141Feb 23, 2026Updated last week
- PwnXSS: Vulnerability (XSS) scanner exploit☆810Dec 30, 2022Updated 3 years ago
- Extract and aggregate threat intelligence.☆906Jan 31, 2024Updated 2 years ago
- Super Next generation Advanced Reactive honEypot☆477Jun 10, 2024Updated last year
- Your Everyday Threat Intelligence☆1,951Feb 12, 2026Updated 2 weeks ago
- Repository to track keywords & patterns lists used by crowdsec parsers and scenarios☆16Dec 18, 2025Updated 2 months ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- In-depth attack surface mapping and asset discovery☆14,159Feb 22, 2026Updated last week
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- IntelOwl: manage your Threat Intelligence at scale☆4,467Updated this week
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,257Apr 12, 2024Updated last year
- OWASP Joomla Vulnerability Scanner Project https://www.secologist.com/☆1,171Sep 11, 2024Updated last year
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆77Mar 14, 2023Updated 2 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last month
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago