ahhh / HoneyTagsView external linksLinks
An opensource project similar to HoneyDocs
☆26Oct 10, 2015Updated 10 years ago
Alternatives and similar repositories for HoneyTags
Users that are interested in HoneyTags are comparing it to the libraries listed below
Sorting:
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 10 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆24Jun 18, 2018Updated 7 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Beagle(bone) in the Middle☆25Oct 9, 2020Updated 5 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Feb 6, 2023Updated 3 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Ambush Host Intrusion Prevention System☆65Sep 8, 2013Updated 12 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Jun 27, 2017Updated 8 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- Check read, write permissions on S3 buckets in your account☆20Jun 20, 2019Updated 6 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Mar 8, 2018Updated 7 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Jun 11, 2019Updated 6 years ago
- ☆30Apr 16, 2015Updated 10 years ago
- Location service☆23Jan 23, 2026Updated 3 weeks ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆57Apr 12, 2020Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Aug 6, 2014Updated 11 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Duct Tape Command and Control!☆96Jul 17, 2025Updated 6 months ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Aug 21, 2015Updated 10 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- MXET-300 Mobile Robotics Class utilizing the SCUTTLE Platform☆13Jun 16, 2025Updated 7 months ago
- The fastest (and least featureful) DNS bruteforcer in the South☆27Dec 31, 2019Updated 6 years ago
- ☆32May 9, 2021Updated 4 years ago
- Honeypot deployment made easy☆237Mar 13, 2019Updated 6 years ago
- ☆32Aug 5, 2015Updated 10 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago