port scanner & login credential tester
☆15Mar 25, 2019Updated 6 years ago
Alternatives and similar repositories for honey-hornet
Users that are interested in honey-hornet are comparing it to the libraries listed below
Sorting:
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Raspberry PI Vulnerability Study using Flask, PWA VueJS 2, Requests, Vue-Socket.io and Flask SocketIO☆27Nov 21, 2017Updated 8 years ago
- Scripts and code example about penetration testing, web, network and exploiting wireless devices.☆11Jun 24, 2018Updated 7 years ago
- Proposing security measures and security analysis in the Fiware IoT environment.☆22Oct 4, 2018Updated 7 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆19Aug 8, 2018Updated 7 years ago
- Create a Twilio-powered device that keeps watch over dangerous and remote locations and alerts stakeholders of intrusions or safety conce…☆22Jun 21, 2024Updated last year
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- Attify Badge GUI tool to interact over UART, SPI, JTAG, GPIO etc.☆69Feb 22, 2021Updated 5 years ago
- USB Attack Development Platform☆34May 19, 2018Updated 7 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Keywordlibrary for MongoDB☆15Oct 14, 2015Updated 10 years ago
- A collection of loosely related OpenEmbedded layers providing several security technologies☆37Aug 4, 2022Updated 3 years ago
- Provides a Learning Tools Interoperability (LTI) integration for creating WordPress blogs with appropriate user roles based on roles set …☆12Mar 17, 2025Updated 11 months ago
- JSON Schema validation library for Robot Framework☆10Jul 2, 2019Updated 6 years ago
- Mindguard software, by Zapatopi.net Intradimensional☆10Nov 17, 2020Updated 5 years ago
- An image steganography with high embedding capacity based on a genetic algorithm☆11Nov 9, 2019Updated 6 years ago
- A Postgres migrations tool with an emphasis on safety and transparency☆10Jun 1, 2021Updated 4 years ago
- Linux Desktop Test Project (LDTP) Library for Robot Framework.☆11Aug 3, 2017Updated 8 years ago
- Data Commander is a front-end for SQL and other databases. The program has a plugin architecture for adding arbitrary data providers.☆11Feb 23, 2026Updated 2 weeks ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Android AirKiss配网Java实现,支持中文WiFI名称。☆12Jul 2, 2019Updated 6 years ago
- ☆11Dec 28, 2019Updated 6 years ago
- python+Selenium爬虫:模拟登录+自动点击☆12Dec 11, 2017Updated 8 years ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Jan 4, 2018Updated 8 years ago
- TCP location updating proxy for Kismet Remote☆12Jan 20, 2022Updated 4 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- A database testing library for the Robot Framework☆12Jan 21, 2022Updated 4 years ago
- 用python写自己的第一个区块链☆12Mar 5, 2018Updated 8 years ago
- Python command line application to stack files in directory based on extension, type, and created date.☆13Dec 10, 2018Updated 7 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- 《动手学深度学习》:面向中文读者、能运行、可讨论。英文版即伯克利“深度学习导论(STAT 157)”教材。☆10Jul 27, 2019Updated 6 years ago
- WiFi_Toolkit my tiny wifi pentesting multitool. this code is really old and it should not be used in real pentesting operations.☆11Aug 30, 2025Updated 6 months ago
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- Swiss Army knife for arbitrarily structured binary files☆10Jun 12, 2019Updated 6 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago