d1str0 / drupotLinks
Drupal Honeypot
☆57Updated 5 years ago
Alternatives and similar repositories for drupot
Users that are interested in drupot are comparing it to the libraries listed below
Sorting:
- Scan for and exploit Consul agents☆40Updated 5 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- ☆25Updated 4 years ago
- Burp Commander written in Go☆58Updated 6 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Updated 8 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆77Updated last year
- Index all certificates from certificate transparancy into Elasticsearch☆23Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- web based nmap scan collection and search☆19Updated 4 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- A Go library which main purpose is giving an interface to loop over a dictionary and use those words/lines as input for some custom logic…☆56Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- cloud-proxy creates multiple DO droplets and then starts local socks proxies using SSH☆62Updated 2 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Simple DDE object detector☆56Updated 7 years ago
- ☆98Updated 6 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 6 years ago
- Use Markov Chains to obfuscate data as other data☆53Updated 8 years ago
- ☆32Updated 9 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Updated 8 years ago