cypwnpwnsocute / RedisHoneyPot
High Interaction Honeypot Solution for Redis protocol
☆16Updated 3 years ago
Related projects: ⓘ
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Updated 2 months ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- ☆42Updated 2 years ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- ☆22Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- A rogue DNS detector☆23Updated 11 months ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆35Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 6 months ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆45Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 4 months ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆14Updated last year
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago
- Passive-Recursive DNS daemon☆25Updated last year
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 6 years ago
- SMTP honeypot written in Golang☆27Updated 8 years ago
- Data exfiltration and covert communication tool☆36Updated last year
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆64Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 6 months ago
- A Yara Lua output script for Suricata☆19Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆12Updated 3 years ago
- A web shell for pivoting and lateral movement☆31Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆36Updated 2 months ago
- bap - http Basic Authentication honeyPot☆46Updated 9 years ago