UnaPibaGeek / honeypots-detectionLinks
Nuclei templates for honeypots detection.
☆196Updated 2 years ago
Alternatives and similar repositories for honeypots-detection
Users that are interested in honeypots-detection are comparing it to the libraries listed below
Sorting:
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆143Updated last year
- Automate Scoping, OSINT and Recon assessments.☆98Updated last month
- Red Team Guides☆143Updated last year
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆152Updated 3 months ago
- A Slack bot phishing framework for Red Teaming exercises☆165Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆220Updated 2 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- Web Hacking and Red Teaming MindMap☆78Updated last month
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 2 months ago
- A compilation of important commands, files, and tools used in Pentesting☆52Updated 2 years ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆373Updated 3 weeks ago
- This is an AD pentest tools collection☆59Updated last year
- ☆196Updated 2 years ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 6 months ago
- A fast and comprehensive tool for organizational network scanning☆134Updated last year
- ☆25Updated 2 years ago
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆181Updated last year
- ☆91Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆136Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- ☆55Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆242Updated last year
- My public notes about offensive security☆165Updated 3 months ago
- Search for sensitive data in Postman public library.☆216Updated 3 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Updated 8 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆133Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆83Updated 2 years ago