☆20Nov 22, 2016Updated 9 years ago
Alternatives and similar repositories for beartrap
Users that are interested in beartrap are comparing it to the libraries listed below
Sorting:
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15May 5, 2023Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Popular Apks Downloader☆13Aug 21, 2013Updated 12 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in th…☆33Oct 13, 2022Updated 3 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- Host files with DNS☆33Mar 1, 2016Updated 10 years ago
- Repository to store unique seeds for DNS server fuzzing☆45Feb 18, 2016Updated 10 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Connectors for the Zeek NetControl framework☆19Feb 4, 2025Updated last year
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- ☆25Aug 14, 2015Updated 10 years ago
- Tool to analyze iOS crash reports☆29Jan 12, 2014Updated 12 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- Web Exploitation Framework - Beta Release☆24Mar 20, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Jun 18, 2019Updated 6 years ago
- Ruby web application security assessment console☆62Mar 3, 2019Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Nov 8, 2012Updated 13 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Dynamips-GDB-Mod is a patch to the Dynamips Cisco IOS emulator which facilitates debugging and reverse engineering process of Cisco IOS.☆33Mar 13, 2013Updated 12 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 10 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- A simple Nessus results viewer☆49Aug 30, 2013Updated 12 years ago