dudeintheshell / blackholeLinks
☆37Updated 10 years ago
Alternatives and similar repositories for blackhole
Users that are interested in blackhole are comparing it to the libraries listed below
Sorting:
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Updated 9 years ago
- Snort rules☆35Updated 7 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Updated 9 years ago
- ☆42Updated 3 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Updated 2 years ago
- A LKM rootkit for Linux kernel 2.6.x, 3.x and 4.x☆45Updated 9 years ago
- LFI scan, exploit tool☆13Updated 11 years ago
- ☆11Updated 9 years ago
- ☆53Updated 10 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)☆52Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 12 years ago
- SQLChop reverse http proxy module☆32Updated 10 years ago
- A template project for creating a shellcode for the Cisco IOS in the C language☆34Updated 8 years ago
- Vulners signature-base software version detection rules☆38Updated 4 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 8 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 7 years ago
- # Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS…☆53Updated 8 years ago
- Automatically exported from code.google.com/p/plcscan☆60Updated 10 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- Some tools to monitor BillGates CnC servers☆136Updated 11 years ago
- rename☆19Updated 8 years ago
- ☆20Updated 2 years ago
- ☆15Updated 8 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 11 years ago
- ☆15Updated 6 years ago
- Attack-Defend CTF Tools☆23Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 10 years ago