evilsocket / medusa
A fast and secure multi protocol honeypot.
☆316Updated 2 years ago
Alternatives and similar repositories for medusa:
Users that are interested in medusa are comparing it to the libraries listed below
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆224Updated 2 years ago
- A tool for IDN homograph attacks and detection.☆734Updated 4 years ago
- A crossplatform mDNS enumeration tool.☆349Updated 2 years ago
- TCP connection hijacker, Rust rewrite of shijack☆497Updated 5 months ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago
- zero-trust remote firewall instrumentation☆229Updated 8 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆451Updated 2 weeks ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆221Updated 4 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆119Updated this week
- A malware analysis and classification tool.☆190Updated 3 years ago
- Modern tactical exploitation toolkit.☆842Updated 8 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Updated 2 years ago
- A polyglot payload generator☆240Updated 2 years ago
- A Comprehensive Web Fuzzer and Content Discovery Tool☆539Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆596Updated 10 months ago
- Execute ELF files without dropping them on disk☆491Updated 9 months ago
- An open source swiss army knife for arbitrary communication over application protocols☆239Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆194Updated 3 years ago
- A modular OSINT honeypot for blue teamers☆333Updated last year
- Attack Surface Management since before Attack Surface Management was a thing☆639Updated last week
- Overlord - Red Teaming Infrastructure Automation☆616Updated 10 months ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆184Updated last year
- Scan only once by IP address and reduce scan times with Nmap for large amounts of data.☆385Updated last year
- Golang reverse/bind shell generator☆229Updated 3 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆83Updated 4 years ago
- A passive subdomain finder☆328Updated last year
- tool for generating wordlists or extending an existing one using mutations.☆383Updated 3 weeks ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆199Updated 3 years ago
- Hide your payload in DNS☆612Updated last year