SVelizDonoso / logfishh
Logs Forensic Investigator SSH
☆15Updated 6 years ago
Alternatives and similar repositories for logfishh:
Users that are interested in logfishh are comparing it to the libraries listed below
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ☆19Updated 9 years ago
- Manageable report from lynis text output, in various formats.☆70Updated 3 weeks ago
- openVAS with ansible☆21Updated 10 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- A low/zero interaction ssh authentication logging honeypot☆21Updated 8 months ago
- Small bash script for OpenVAS installation and management☆21Updated 5 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆15Updated 7 years ago
- Orb is a massive footprinting tool.☆46Updated 5 years ago
- Python backdoor that uses http post/get requests to communicate☆40Updated 8 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- Smoking Linux Every Day!☆54Updated 4 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 10 years ago
- Python script to check the hashes of files in a directory against virustotal.com☆16Updated 9 years ago
- Application Layer IDS/IPS with iptables☆76Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆37Updated 8 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- ☆81Updated last year
- Automatically enumerate and fingerprint SD-WAN nodes on the internet☆50Updated 3 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Different utility scripts for pentesting and hacking.☆49Updated 7 years ago
- little scripts created during my time as a pentetration tester☆31Updated 12 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago