ajackal / honey-hornetLinks
port scanner & login credential tester
☆16Updated 6 years ago
Alternatives and similar repositories for honey-hornet
Users that are interested in honey-hornet are comparing it to the libraries listed below
Sorting:
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- A tool for recover router password☆30Updated 7 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A web app scanner☆26Updated 11 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 8 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Get clients and access points.☆49Updated 5 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Search bing with python☆12Updated 10 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago