edoardottt / boggartLinks
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
☆36Updated 2 weeks ago
Alternatives and similar repositories for boggart
Users that are interested in boggart are comparing it to the libraries listed below
Sorting:
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- masscan with exclusive excludes☆58Updated 2 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆50Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆32Updated 2 years ago
- aws cli pentesting/red team snippets☆32Updated 2 years ago
- ☆14Updated 10 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- SMTP Open Relay Exploitation☆16Updated 5 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- Site fast fuzzing with chorme extension.☆24Updated 4 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆45Updated 8 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- web application pentesting tools for docker☆17Updated 3 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Updated 3 years ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16Updated 7 years ago