eldraco / theinfinitewebpage
This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it automatically tries to download it.
☆20Updated 10 years ago
Alternatives and similar repositories for theinfinitewebpage:
Users that are interested in theinfinitewebpage are comparing it to the libraries listed below
- first commit☆20Updated last year
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 6 months ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Series of scripts to generate fake logs for use in cyber exercises.☆17Updated 9 years ago
- Mass zone transfer python script☆16Updated 8 years ago
- Spam trap management☆23Updated 10 months ago
- A generic data anomaly finder. You can use a beautiful web page, drag-and-drop your csv dataset and easily find the top N anomalies in th…☆33Updated 2 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- ☆21Updated 9 years ago
- ☆12Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- Universal Honey Pot☆29Updated 2 years ago
- ☆25Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- cuckoo sandbox patches and scripts☆15Updated 11 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Automated Memory Forensic☆35Updated 6 years ago