honeynet / ghost-usb-honeypot
A honeypot for malware that propagates via USB storage devices
☆96Updated 10 years ago
Alternatives and similar repositories for ghost-usb-honeypot:
Users that are interested in ghost-usb-honeypot are comparing it to the libraries listed below
- A short and small memory forensics helper.☆52Updated 7 years ago
- VirusTotal tools☆90Updated 4 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Malware Control Monitor☆87Updated 10 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- A repository of tools and scripts related to malware analysis☆248Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆137Updated 3 weeks ago
- Transparent network tap☆116Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆81Updated 9 years ago
- Process HTTP Pcaps With YARA☆102Updated 11 years ago
- Rogue AP killer☆89Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- ☆46Updated 8 years ago