UnaPibaGeek / honeypots-detectionLinks
Nuclei templates for honeypots detection.
☆194Updated last year
Alternatives and similar repositories for honeypots-detection
Users that are interested in honeypots-detection are comparing it to the libraries listed below
Sorting:
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 6 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆176Updated 4 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆358Updated last month
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆139Updated last year
- Everything and anything related to password spraying☆138Updated last year
- Shodan Dorks 2023☆236Updated 4 months ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 4 months ago
- Red Team Guides☆138Updated last year
- Azure mindmap for penetration tests☆185Updated last year
- ☆168Updated 9 months ago
- Search for all leaked keys/secrets using one regex! bugbounty☆128Updated 2 months ago
- ☆183Updated last month
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆233Updated 8 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆91Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- ☆166Updated last month
- Find CVEs associated to Linux and public exploits on github☆117Updated last month
- Session Hijacking Visual Exploitation☆200Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆348Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated 10 months ago
- ☆74Updated 10 months ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆175Updated last year
- Collection of offensive tools targeting Microsoft Azure☆207Updated 2 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆181Updated 8 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆99Updated last week
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆77Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆186Updated 3 months ago
- PowerShell Obfuscator☆175Updated 11 months ago