Kako "IoT" honeypot framework.
☆28Aug 26, 2020Updated 5 years ago
Alternatives and similar repositories for kako
Users that are interested in kako are comparing it to the libraries listed below
Sorting:
- FTP Honeypot☆34Jan 22, 2024Updated 2 years ago
- ☆15Aug 17, 2017Updated 8 years ago
- observation camera honeypot☆53Jun 18, 2015Updated 10 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- Crypto coin ticker counter for Reddit comments.☆10Dec 1, 2021Updated 4 years ago
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated 11 months ago
- Calibre plugin to synchronize books with Google Books☆12May 11, 2020Updated 5 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- Shamir Secret Sharing for Nim☆10May 28, 2021Updated 4 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- Tool for controlling the special features of a "U3 smart drive" USB Flash disk.☆12Dec 23, 2015Updated 10 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- ☆13Mar 14, 2015Updated 10 years ago
- ☆13May 12, 2019Updated 6 years ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- honeypot go lang emulators☆11Feb 28, 2016Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Oct 28, 2018Updated 7 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- NixNoteにタブブラウザ機能と連想ノート機能を付けました。連想ノート機能はユーザの操作履歴に基づいて関連するノートを算出して提示します。☆14Jul 20, 2015Updated 10 years ago
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- Open Source Telnet Honeypot☆106Mar 20, 2017Updated 8 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- ☆16Apr 16, 2017Updated 8 years ago
- ☆12Jul 1, 2018Updated 7 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- Non-intrusive DDS Recorder is a tool to record all the DDS traffic in your network, using a non-intrusive mechanism allowing you to test,…☆12Oct 17, 2024Updated last year
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- A fake IoT toaster that mimics a login procedure on port 23 with the hopes of recording hacking attempts.☆10Oct 30, 2016Updated 9 years ago
- Shell script to automate running the Nmap smb-security-mode.nse or RunFinger.py by lgandx and parse results into counts and lists of host…☆14Nov 3, 2017Updated 8 years ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Various tools to aid with scambaiting☆12Dec 2, 2018Updated 7 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Turn your Readwise library into a blazing-fast, self-hosted semantic search engine – complete with nightly syncs, vector search API, Prom…☆24Jul 28, 2025Updated 7 months ago
- ☆11Jul 21, 2016Updated 9 years ago
- VisualFirewall/IDS is a research-grade Firewall and IDS visualization tool that aims to provide a highly-informative interface of network…☆15Oct 6, 2014Updated 11 years ago
- A credential dumping SSH honeypot with statistics☆14Oct 18, 2019Updated 6 years ago
- This is a client-server app in C++ that encrypts messages using ChaCha20-Poly1305 and uses X25519 for secure key exchange. It supports bi…☆22Sep 10, 2025Updated 5 months ago