aau-network-security / HosTaGe
Low Interaction Mobile Honeypot
☆93Updated last year
Alternatives and similar repositories for HosTaGe:
Users that are interested in HosTaGe are comparing it to the libraries listed below
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 9 months ago
- Malware vulnerability intel tool for third-party attackers☆116Updated 5 months ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 9 months ago
- Ethical hacking, CTF, tools & etc☆22Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆63Updated 4 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- ☆51Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆58Updated last year
- Mobile Application Vulnerability Scanner☆20Updated last month
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Malware Analysis Tools☆30Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Pentest stuff☆49Updated last year
- Static and dynamic Android application security analysis☆72Updated 10 months ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆63Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated last year
- Commands used in Windows penetration tests☆50Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- A wireless playground using mac80211 hwsim devices and docker containers.☆9Updated last year
- Notes and IoCs of fresh malware☆57Updated 9 months ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated this week