evilsocket / medusaLinks
A fast and secure multi protocol honeypot.
☆322Updated 2 years ago
Alternatives and similar repositories for medusa
Users that are interested in medusa are comparing it to the libraries listed below
Sorting:
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- A crossplatform mDNS enumeration tool.☆355Updated 2 years ago
- zero-trust remote firewall instrumentation☆251Updated last year
- Flamingo captures credentials sprayed across the network by various IT and security products.☆475Updated 3 weeks ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆605Updated last year
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆124Updated this week
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- tool for generating wordlists or extending an existing one using mutations.☆387Updated 2 months ago
- TCP connection hijacker, Rust rewrite of shijack☆523Updated 10 months ago
- NIST-based CVE lookup store and API powered by Rust.☆132Updated last month
- An open source swiss army knife for arbitrary communication over application protocols☆242Updated 4 years ago
- Fast Steganography bruteforce tool written in Rust useful for CTF's☆246Updated 2 months ago
- Attack Surface Management since before Attack Surface Management was a thing☆651Updated this week
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆358Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆223Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- A Comprehensive Web Fuzzer and Content Discovery Tool☆550Updated 2 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆381Updated 9 months ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆242Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,461Updated 2 years ago
- A targeted DNS cache poisoner☆122Updated 2 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆378Updated 4 years ago
- A tool for IDN homograph attacks and detection.☆738Updated 4 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆201Updated 5 months ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆255Updated last year
- Pivoting Frontend for Pre-Seeded Password Databases☆132Updated last month