adhdproject / wordpot
A Wordpress Honeypot
☆9Updated 3 years ago
Alternatives and similar repositories for wordpot:
Users that are interested in wordpot are comparing it to the libraries listed below
- a port made of honey for blocking people☆11Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 3 years ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- A PoC backdoor that uses Gmail as a C&C server☆12Updated 4 years ago
- Setting up a training environment for MISP☆11Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- Open YARA scan- and search engine☆20Updated 3 weeks ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 11 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 3 years ago
- ☆11Updated 7 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆24Updated 2 years ago
- ☆11Updated 4 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆17Updated 5 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- THOR APT Scanner User Manual☆18Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated last month
- Useful commands for infosec☆29Updated last year
- ☆24Updated last year
- A tool to run a command when the target of a symlink changes☆15Updated 8 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆34Updated last year
- Ideaslocas Repository☆37Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Hashes of infamous malware☆25Updated last year
- CLI tools using Harpoon features☆21Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆18Updated this week