betheroot / sticky_elephantLinks
medium interaction postgresql honeypot
☆11Updated 10 months ago
Alternatives and similar repositories for sticky_elephant
Users that are interested in sticky_elephant are comparing it to the libraries listed below
Sorting:
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 7 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆13Updated 4 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 6 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- ☆16Updated 5 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- HoneyDB Python Module☆13Updated last year
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 8 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆25Updated 2 years ago
- Collect autorun records from running system☆60Updated 3 years ago
- ☆24Updated 2 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Network based steganography based control channels and chat.☆8Updated 9 years ago