TeamDefronix / DefroxPotLinks
DefroxPot is a honeypot project designed to detect, monitor, and analyze malicious activity in a controlled environment. This project aims to provide cybersecurity enthusiasts and professionals with a powerful tool to study attack patterns, improve defensive strategies, and enhance security awareness.
☆18Updated last year
Alternatives and similar repositories for DefroxPot
Users that are interested in DefroxPot are comparing it to the libraries listed below
Sorting:
- An insane list of all dorks taken from everywhere from various different sources.☆749Updated last year
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆50Updated 8 months ago
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆505Updated last year
- 🚀 A modern, responsive portfolio template for cybersecurity professionals built with React, TypeScript, and Flowbite. Features include s…☆34Updated 7 months ago
- Hands-on ethical hacking projects for beginners, covering network scanning, web app testing, password cracking, honeypots, Wi-Fi auditing…☆376Updated last year
- This is a project to perform a BRUTE FORCE attack on a self hosted website to better the understanding of the importance of cybersecurity…☆26Updated last year
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆18Updated 5 months ago
- Complete Roadmap for Penetration Testing☆252Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆257Updated 11 months ago
- Bug Bounty Methodology 2025: Tools, techniques, and steps to guide you through reconnaissance, enumeration, and testing.☆313Updated 7 months ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆311Updated last month
- Wi-Fi Deauthentication Tool is a command-line utility for educational purposes, enabling users to perform Wi-Fi network actions such as s…☆84Updated 2 years ago
- Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App☆615Updated 4 months ago
- Shodan Dorks☆470Updated 10 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆576Updated last week
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆226Updated 8 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated 2 months ago
- TryhackMerooms☆20Updated 2 years ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆95Updated 8 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux a…☆476Updated 2 weeks ago
- tool used to change your IP every second your want☆423Updated last year
- Cross-Site Scripting (XSS) injects malicious scripts into trusted websites via user input. Attacker-sent scripts run in users' browsers, …☆64Updated 2 years ago
- ☆49Updated 6 months ago
- ☆140Updated 6 months ago
- Here you can find mostly all disclosed h1 reports☆28Updated 3 years ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆686Updated 3 weeks ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆79Updated 2 years ago
- ☆113Updated 2 years ago
- API-Pentesting-Checklist☆19Updated 2 years ago