buffer / phoneycLinks
☆16Updated 10 years ago
Alternatives and similar repositories for phoneyc
Users that are interested in phoneyc are comparing it to the libraries listed below
Sorting:
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- Juniper backdoor☆14Updated 10 years ago
- Python Scanner for "ShellShock" (CVE-2014-6271)☆45Updated 11 years ago
- ☆37Updated 10 years ago
- ☆48Updated 3 years ago
- Patch pyc files with your code. Fairly lame.☆67Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- ssh key exchange layer for scapy☆13Updated 11 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Peach Fuzzer Web Frontend☆51Updated 4 years ago
- random python stuff☆26Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- some tasks/solutions from CTF challenges☆68Updated 9 years ago
- Some tools to monitor BillGates CnC servers☆136Updated 11 years ago
- ☆20Updated 2 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 11 years ago
- Some kernel exploit i wrote☆76Updated 11 years ago
- ☆42Updated 3 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Updated 7 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- Mass scanning and fuzzing library☆48Updated 2 weeks ago
- ☆86Updated 2 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- Exploits, Fuzzers, Scripts etc☆35Updated last month
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆91Updated 12 years ago
- A Libemu Cython wrapper☆128Updated 2 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago
- Tagging and annotation framework for scan data☆101Updated 7 years ago
- A tool for automated MITM attacks on SSL connections.☆22Updated 13 years ago