Honeybadger Red Edition
☆13Sep 13, 2017Updated 8 years ago
Alternatives and similar repositories for honeybadger-red
Users that are interested in honeybadger-red are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆205Oct 31, 2021Updated 4 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Outputs a reduced keyspace of 8 upper alpha chars.☆10Oct 20, 2015Updated 10 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- Deep and Dark Web OSINT Tool☆10Sep 18, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆13Aug 16, 2022Updated 3 years ago
- Keep your SSH private keys on a USB keychain; use a script to initialize a self-destructing ssh-agent instance☆23Sep 4, 2019Updated 6 years ago
- 🕵🏻📡👁🔍Analyzes all Open Wireless Networks for detect fake access points (Fingerprint)☆16Aug 13, 2018Updated 7 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool to enumerate network services☆24Oct 30, 2019Updated 6 years ago
- red5 web rtc demo☆12Sep 15, 2017Updated 8 years ago
- IceDB S3 Proxy to trick S3 clients into only seeing alive files☆13Dec 24, 2023Updated 2 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Sep 26, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- A step-by-step guide on installing Python and using the Command Prompt for Windows☆19Jan 3, 2017Updated 9 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- LackeyCCG plugin for Star Wars: Trading Card Game☆13Updated this week
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- ☆19Dec 5, 2016Updated 9 years ago
- serf + headless chromium && CDP☆15Jan 8, 2021Updated 5 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15Aug 28, 2025Updated 6 months ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆16Aug 12, 2025Updated 7 months ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- Updated version of C2K☆51Mar 22, 2018Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago