droberson / ssh-honeypot
Fake sshd that logs ip addresses, usernames, and passwords.
☆652Updated 5 months ago
Alternatives and similar repositories for ssh-honeypot:
Users that are interested in ssh-honeypot are comparing it to the libraries listed below
- IPv6 attack toolkit☆1,079Updated 2 months ago
- The best way to scan for weak ssh passwords on your network☆611Updated last year
- A framework for layer 2 attacks☆767Updated last year
- Credentials catching honeypot☆380Updated 11 months ago
- Ncrack network authentication tool☆1,123Updated last year
- SSH man-in-the-middle tool☆1,656Updated 3 years ago
- Kippo - SSH Honeypot☆1,674Updated last year
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆998Updated 3 years ago
- Home of the dionaea honeypot☆739Updated 8 months ago
- Advanced Honeypot framework.☆1,249Updated last year
- EternalRocks worm☆458Updated 7 years ago
- Data exfiltration over DNS request covert channel☆866Updated 11 months ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 9 months ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- psad: Intrusion Detection and Log Analysis with iptables☆401Updated last year
- python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using ipt…☆350Updated 2 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,675Updated last week
- Snoopy Command Logger is a small library that logs all program executions on your Linux/BSD system.☆1,246Updated 5 months ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,440Updated last year
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated last year
- Modern Honey Network☆2,447Updated 4 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 6 months ago
- DHCP exhaustion script written in python using scapy network library☆341Updated 11 months ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆540Updated last year
- IP over ICMP☆452Updated 8 months ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,596Updated 4 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,310Updated 3 years ago
- Passwords of SSH Intruders Transferred to Text☆159Updated 10 months ago
- Web Application Honeypot☆573Updated 8 months ago
- ☆3,566Updated last year