aau-network-security / HosTaGeLinks
Low Interaction Mobile Honeypot
☆95Updated 4 months ago
Alternatives and similar repositories for HosTaGe
Users that are interested in HosTaGe are comparing it to the libraries listed below
Sorting:
- Create visualization from Shodan query☆75Updated 4 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆23Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- ☆42Updated 6 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Just another vulnerable web application.☆36Updated last year
- fsp - Firestore Database Vulnerability Scanner Using APKs☆62Updated 4 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A WLAN red team framework.☆154Updated last year
- ☆53Updated 4 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 10 months ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago