evilsocket / medusa
A fast and secure multi protocol honeypot.
☆313Updated 2 years ago
Alternatives and similar repositories for medusa:
Users that are interested in medusa are comparing it to the libraries listed below
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆216Updated 2 years ago
- Overlord - Red Teaming Infrastructure Automation☆611Updated 8 months ago
- gather gather gather☆567Updated 10 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆595Updated 7 months ago
- zero-trust remote firewall instrumentation☆225Updated 6 months ago
- A tool for IDN homograph attacks and detection.☆730Updated 3 years ago
- Flamingo captures credentials sprayed across the network by various IT and security products.☆452Updated last month
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆218Updated 3 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆370Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆238Updated 4 years ago
- A crossplatform mDNS enumeration tool.☆345Updated 2 years ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆195Updated 7 months ago
- SolarWinds Orion Account Audit / Password Dumping Utility☆351Updated last year
- A polyglot payload generator☆239Updated 2 years ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆789Updated 8 months ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆366Updated 2 months ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆758Updated 4 years ago
- TCP connection hijacker, Rust rewrite of shijack☆490Updated 3 months ago
- Zero Infrastructure Password Cracking☆400Updated 5 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆242Updated 2 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆244Updated 2 weeks ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆116Updated last week
- A malware analysis and classification tool.☆191Updated 3 years ago
- Modern tactical exploitation toolkit.☆841Updated 6 months ago
- ☆333Updated 2 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,104Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆208Updated 4 years ago
- Scan only once by IP address and reduce scan times with Nmap for large amounts of data.☆387Updated last year
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆182Updated last year