bjeborn / basic-auth-potLinks
bap - http Basic Authentication honeyPot
☆50Updated 10 years ago
Alternatives and similar repositories for basic-auth-pot
Users that are interested in basic-auth-pot are comparing it to the libraries listed below
Sorting:
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- List of default passwords for Industrial Control Systems☆75Updated 8 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated 9 months ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆75Updated 2 years ago
- A simple and effective phpmyadmin honeypot☆67Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- Distributed Honeypot☆62Updated 7 years ago
- Python script to hunt phishing kits☆139Updated last year
- Search drives for documents containing passwords☆63Updated 11 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago
- Maltego integration of https://haveibeenpwned.com☆60Updated 4 months ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated 2 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆83Updated 4 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago