danielmiessler / HoneyCredIPTracker
Quick script to gather stats on incoming credentials and IPs for a honey listener.
☆107Updated 2 years ago
Alternatives and similar repositories for HoneyCredIPTracker:
Users that are interested in HoneyCredIPTracker are comparing it to the libraries listed below
- A repo for collecting and organizing security tools of various types. As new ones come out, they get added to the list.☆92Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆147Updated 2 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 5 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆236Updated 4 years ago
- This tool will harvest valid DNS subdomains from a given domain.☆62Updated 2 years ago
- Orb is a massive footprinting tool.☆45Updated 5 years ago
- A simple script for translating IP addresses to GeoLocations☆39Updated 2 years ago
- Pentest dropbox setup scripts for Kali Linux☆88Updated 8 years ago
- A tool to harvest credentials from leaked data dump☆64Updated 3 years ago
- Additional modules for recon-ng☆104Updated 7 years ago
- Tool to automatic leak information using Hacking with engine searches☆92Updated 6 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 4 years ago
- Homemade scripts to-do various vulnerable challenges☆75Updated 4 years ago
- BugOutBag☆64Updated 2 years ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆49Updated 8 years ago
- Recon-ng is a full-featured Web Reconnaissance framework written in Python.☆38Updated 9 years ago
- Does some google dorks against a domain☆164Updated 4 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆125Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- Opinionated organisation-centric OSINT footprinting inspired from recon-ng and Maltego☆170Updated 7 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆90Updated 10 months ago
- "PRinter Exploitation Toolkit" LAN automation tool☆200Updated 5 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- Small backdoor using cookie.☆59Updated 8 years ago