foospidy / HoneyMiner
Deploy a honeypot and a crypto currency miner together, so sweet.
☆16Updated 6 years ago
Alternatives and similar repositories for HoneyMiner:
Users that are interested in HoneyMiner are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Search bing with python☆11Updated 10 years ago
- Phishing Toolkit☆19Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Various exploits☆10Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆10Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Software exploitation training material☆15Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago