bjeborn / basic-auth-pot
bap - http Basic Authentication honeyPot
☆47Updated 10 years ago
Alternatives and similar repositories for basic-auth-pot:
Users that are interested in basic-auth-pot are comparing it to the libraries listed below
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- FTP Honeypot☆30Updated 11 months ago
- A simple and effective phpmyadmin honeypot☆65Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆56Updated 4 months ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- Spam Honeypot Tool☆26Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆92Updated 4 years ago
- A few transforms and a machine for parsing Nmap XML results☆36Updated 8 years ago
- Yara scan Phishing Kit's Zip archive(s)☆55Updated 9 months ago
- Yara rules to be used with the Burp Yara-Scanner extension☆45Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆24Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆56Updated 10 years ago
- ☆24Updated last year
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Search drives for documents containing passwords☆62Updated 10 years ago
- NCC Group Ransomware Simulator☆68Updated 8 years ago
- recon-ng Maltego local transform pack☆39Updated 11 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Automated Security Assessment Reporting Tool☆39Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago