adhdproject / spidertrapLinks
Traps web spiders
☆77Updated 5 years ago
Alternatives and similar repositories for spidertrap
Users that are interested in spidertrap are comparing it to the libraries listed below
Sorting:
- A basic flask based Outlook Web Honey pot☆68Updated 2 years ago
- ☆133Updated 4 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last month
- God Mode Detection Rules☆134Updated last year
- Knowledge base on cybercriminal concealment techniques☆88Updated 7 months ago
- DShield Sensor Log Collection with ELK☆46Updated this week
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 11 months ago
- Creation of a laboratory for malware analysis in AWS☆104Updated 3 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆146Updated 2 weeks ago
- Identify Azure blobs using a wordlist of account name and container name strings☆44Updated 9 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆59Updated 7 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆188Updated last year
- Pwnspoof repository☆264Updated 2 years ago
- Tools for simulating threats☆199Updated 2 years ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability with…☆103Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆106Updated 2 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- A tool for mapping cyber crime☆223Updated 8 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- Dredging up secrets from the depths of the file system☆131Updated last year
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆107Updated 2 months ago
- Docker container for the gophish phishing framework.☆52Updated this week
- Finding ClickFix and FakeCAPTCHA like it's 1999☆116Updated this week
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- Signature based honeypot detector tool written in Golang☆107Updated 8 months ago
- ☆64Updated 4 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆280Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- A simple Python script to do quick, targeted recon of a given domain.☆58Updated 8 months ago