Plazmaz / LiquidHoneyView external linksLinks
A small, fluid, low-interaction honeypot
☆18May 20, 2019Updated 6 years ago
Alternatives and similar repositories for LiquidHoney
Users that are interested in LiquidHoney are comparing it to the libraries listed below
Sorting:
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- Base Code for P2P Network Crawlers☆31Aug 2, 2013Updated 12 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Jan 15, 2022Updated 4 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Feb 28, 2017Updated 8 years ago
- Rust `Vec` that can store unsized values☆22Sep 13, 2025Updated 5 months ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 3 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- PSEmailRep is a simple PowerShell module to interface with the EmailRep.io API.☆27Oct 14, 2020Updated 5 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- Excel parser for various pentesting tools.☆30Jun 13, 2023Updated 2 years ago
- ☆12Feb 4, 2025Updated last year
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Feb 2, 2022Updated 4 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 9 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- All-in-one node management tool with support for stEVER DePools☆11May 27, 2024Updated last year
- ☆39May 21, 2022Updated 3 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- ☆12Aug 24, 2020Updated 5 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆14Aug 16, 2019Updated 6 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Integrate "contact-us" functionality on single-page and static websites☆11Jan 12, 2018Updated 8 years ago
- Generate static parallel computation graph from DSL at compile time☆11Nov 6, 2024Updated last year
- IDLSet - Fast u64 integer set operations☆13May 30, 2024Updated last year
- ☆11Feb 5, 2026Updated last week
- A Security Analysis of Honeywords☆15Nov 28, 2017Updated 8 years ago
- A set of primitive types and utilities for the Tycho node☆13Updated this week
- An efficient Rust implementation of the t-digest algorithm.☆11Dec 16, 2025Updated 2 months ago
- Tagging and annotation framework for scan data☆101Oct 16, 2018Updated 7 years ago