evilsocket / medusa
A fast and secure multi protocol honeypot.
☆314Updated 2 years ago
Alternatives and similar repositories for medusa:
Users that are interested in medusa are comparing it to the libraries listed below
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆218Updated 2 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆371Updated 3 years ago
- zero-trust remote firewall instrumentation☆226Updated 7 months ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆452Updated 2 months ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆220Updated 4 years ago
- A crossplatform mDNS enumeration tool.☆347Updated 2 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆193Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- Overlord - Red Teaming Infrastructure Automation☆614Updated 9 months ago
- A tool for IDN homograph attacks and detection.☆731Updated 4 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆241Updated 2 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆239Updated 4 years ago
- tool for generating wordlists or extending an existing one using mutations.☆384Updated last year
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆83Updated 4 years ago
- A polyglot payload generator☆239Updated 2 years ago
- gather gather gather☆570Updated 11 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆429Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆597Updated 9 months ago
- Modern tactical exploitation toolkit.☆841Updated 7 months ago
- A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.☆282Updated 3 weeks ago
- A high performance TCP SYN port scanner.☆315Updated last year
- ☆332Updated 2 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆258Updated last week
- Hide your payload in DNS☆612Updated last year
- a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust☆346Updated 3 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆368Updated 3 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆471Updated 8 months ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆195Updated 8 months ago
- Routopsy - Hacking Routers with Routers☆171Updated 3 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆760Updated 4 years ago