d1str0 / drupot
Drupal Honeypot
☆57Updated 5 years ago
Alternatives and similar repositories for drupot:
Users that are interested in drupot are comparing it to the libraries listed below
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- ☆25Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆23Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- ☆32Updated 9 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Simple DDE object detector☆56Updated 7 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆81Updated 6 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Use Markov Chains to obfuscate data as other data☆53Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Updated 8 years ago