bjeborn / basic-auth-potLinks
bap - http Basic Authentication honeyPot
☆53Updated 11 years ago
Alternatives and similar repositories for basic-auth-pot
Users that are interested in basic-auth-pot are comparing it to the libraries listed below
Sorting:
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆76Updated 3 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Passive recon / OSINT automation script☆39Updated 7 years ago
- A simple and effective phpmyadmin honeypot☆68Updated 7 years ago
- ☆18Updated 2 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆67Updated 8 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- rules to identify files containing juicy information like usernames, passwords etc☆128Updated 7 years ago
- Snort_rules detection bad actors.☆29Updated last year
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Search drives for documents containing passwords☆65Updated 11 years ago
- Check if a IP is from tor or is a malicious proxy☆57Updated 4 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Updated 5 years ago
- A toolkit for Security Researchers☆127Updated 6 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 13 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆92Updated 6 years ago
- scythe: account enumerator☆61Updated 12 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 4 years ago