Python static blog generator
☆42Nov 1, 2016Updated 9 years ago
Alternatives and similar repositories for habu
Users that are interested in habu are comparing it to the libraries listed below
Sorting:
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- Honeypot repo☆48Aug 10, 2015Updated 10 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Bridge the terminal and browser☆18Jul 28, 2023Updated 2 years ago
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- Transparent network tap☆122Oct 7, 2015Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Sep 14, 2016Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆56Nov 25, 2020Updated 5 years ago
- Improved fork of JSON-XS☆41Feb 17, 2026Updated 2 weeks ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- Drive/Gmail/Calendar backups☆32Jan 25, 2021Updated 5 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Honeypot Intelligence with Splunk☆256Oct 18, 2018Updated 7 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Simple Asynchronous HTTP Proxy written in python☆48Jul 12, 2014Updated 11 years ago
- Simple host-based permit-by-exception iptables generation script☆16Sep 5, 2020Updated 5 years ago
- Web content management system and built in eCommerce☆17Updated this week
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- View browser history as a graph (Chrome extension)☆45Aug 20, 2024Updated last year
- Modified edition of cuckoo community modules☆32Sep 9, 2019Updated 6 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- Non-Alphanumeric JS Obfuscator☆14Aug 22, 2016Updated 9 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Apr 19, 2021Updated 4 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Nov 20, 2015Updated 10 years ago
- ☆10Dec 24, 2025Updated 2 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- ☆16May 13, 2021Updated 4 years ago
- A Python 3.x-Compatible Telnet Server Library☆12Jan 24, 2019Updated 7 years ago