A powershell script for creating a Windows honeyport.
☆90Mar 26, 2025Updated 11 months ago
Alternatives and similar repositories for honeyport
Users that are interested in honeyport are comparing it to the libraries listed below
Sorting:
- h00k☆13Jul 28, 2016Updated 9 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆494Jul 29, 2017Updated 8 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Bash and Python Honeyport scripts☆47Feb 22, 2017Updated 9 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Kautilya - Tool for easy use of Human Interface Devices for offensive security and penetration testing.☆870Aug 4, 2017Updated 8 years ago
- ☆24Aug 25, 2015Updated 10 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- Crossplatform hex editor intended mainly for reverse-engineering and data analysis☆10Mar 10, 2018Updated 8 years ago
- A PowerShell module to abstract the complexities of Permanent WMI Event Subscriptions☆55Feb 23, 2016Updated 10 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆12Jan 7, 2020Updated 6 years ago
- Some PowerShell Stuff☆279Jun 15, 2022Updated 3 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- A "tiny" meterpreter stager☆127Aug 20, 2019Updated 6 years ago
- A low to medium interaction honeypot.☆472Mar 21, 2024Updated last year
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A malware/botnet analysis framework written in Ruby.☆195Sep 26, 2023Updated 2 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆120Apr 14, 2021Updated 4 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago