free5ty1e / honeypotpiView external linksLinks
Script for turning a Raspberry Pi into a Honey Pot Pi
☆35Sep 25, 2024Updated last year
Alternatives and similar repositories for honeypotpi
Users that are interested in honeypotpi are comparing it to the libraries listed below
Sorting:
- Distributed Honeypot☆63Apr 29, 2018Updated 7 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- Fully undetected backdoor with RSA Encrypted shell☆11Jan 3, 2018Updated 8 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 7 years ago
- Docker container to run PoisonTap☆15Dec 8, 2016Updated 9 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- Collections of tools, scripts, snippets and so on, used in Rev3rse Security Live☆24Dec 4, 2018Updated 7 years ago
- Spectrum scanning/analysis tools☆27Oct 12, 2018Updated 7 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63May 25, 2019Updated 6 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Dec 23, 2020Updated 5 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Hardware instructions, RF protocol decoding, and control software to enable remote control of commercially available shock collars☆31Jul 5, 2022Updated 3 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- Anti-.NET Malware/Packers - Detect most .NET Packers (and some native) used for malware.☆25May 7, 2017Updated 8 years ago
- ☆38Mar 4, 2020Updated 5 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Check robustness of your (their) Active Directory accounts passwords☆45Mar 5, 2025Updated 11 months ago
- ☆29Jul 11, 2015Updated 10 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Jul 18, 2017Updated 8 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29May 7, 2017Updated 8 years ago
- Embeddable EXI Processor in C☆12Oct 7, 2022Updated 3 years ago