bjeborn / basic-auth-potLinks
bap - http Basic Authentication honeyPot
☆50Updated 10 years ago
Alternatives and similar repositories for basic-auth-pot
Users that are interested in basic-auth-pot are comparing it to the libraries listed below
Sorting:
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated 11 months ago
- Distributed Honeypot☆62Updated 7 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆22Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A simple and effective phpmyadmin honeypot☆67Updated 7 years ago
- ☆18Updated last year
- scythe: account enumerator☆61Updated 12 years ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆75Updated 2 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Ruby based reverse IP-lookup tool.☆57Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 3 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 4 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Snort_rules detection bad actors.☆28Updated last year
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago