UnaPibaGeek / honeypots-detectionLinks
Nuclei templates for honeypots detection.
☆196Updated 2 years ago
Alternatives and similar repositories for honeypots-detection
Users that are interested in honeypots-detection are comparing it to the libraries listed below
Sorting:
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆141Updated last year
- Automate Scoping, OSINT and Recon assessments.☆98Updated 2 weeks ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- Red Team Guides☆142Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆217Updated last month
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- ☆55Updated last year
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆56Updated 11 months ago
- This is an AD pentest tools collection☆59Updated last year
- ☆195Updated 2 years ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆372Updated 2 months ago
- Everything and anything related to password spraying☆150Updated last year
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 5 months ago
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆163Updated last month
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆82Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆153Updated last month
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆182Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- Discovering Typo Squatting on your domains!☆78Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆190Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆112Updated 2 years ago
- ☆91Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 6 months ago
- Shodan Dorks 2023☆245Updated 10 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆130Updated 2 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆110Updated 2 years ago
- A fast and comprehensive tool for organizational network scanning☆135Updated last year