Drupal Honeypot
☆58Jul 14, 2019Updated 6 years ago
Alternatives and similar repositories for drupot
Users that are interested in drupot are comparing it to the libraries listed below
Sorting:
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Python based Office Macro Generator. Also does rudamentary obfuscation.☆12Jun 6, 2016Updated 9 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- ☆15Feb 24, 2019Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆18Oct 7, 2016Updated 9 years ago
- Malware/IOC ingestion and processing engine☆110Nov 20, 2018Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Scan for OSGi Consoles☆21Feb 22, 2024Updated 2 years ago
- ☆44Apr 20, 2020Updated 5 years ago
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A medium interaction printer honeypot 🍯☆203Jul 9, 2023Updated 2 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago
- K8s API Honeypot with Active Defense Capabilities☆44Jan 7, 2024Updated 2 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- Exploits and advisories☆207Dec 29, 2025Updated 2 months ago
- CVE-2018-2628☆20Apr 18, 2018Updated 7 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- RDP honeypot☆71Jun 6, 2019Updated 6 years ago
- Sentry (https://sentry.io/) hook for logrus (https://github.com/sirupsen/logrus)☆12Jun 16, 2019Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit