edoardottt / boggartLinks
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
☆34Updated last week
Alternatives and similar repositories for boggart
Users that are interested in boggart are comparing it to the libraries listed below
Sorting:
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 9 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆13Updated 5 months ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆32Updated 10 months ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Automated HTTP Request Repeating With Burp Suite☆39Updated 2 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Multithreaded spraying of a password on all accounts of a domain.☆23Updated 7 months ago
- APK Infrastructure Investigator☆64Updated 2 years ago
- SMTP Open Relay Exploitation☆15Updated 4 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Site fast fuzzing with chorme extension.☆24Updated 3 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆19Updated 10 months ago
- ☆29Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆49Updated 10 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 3 months ago