honeynet / honeyscannerLinks
Honeyscanner: A vulnerability analyzer for honeypots
☆41Updated 9 months ago
Alternatives and similar repositories for honeyscanner
Users that are interested in honeyscanner are comparing it to the libraries listed below
Sorting:
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- URL fingerprinting made easy☆86Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 7 months ago
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 2 months ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- CLI tools using Harpoon features☆21Updated last year
- Graphical map of known Advanced Persistent Threats☆54Updated 2 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 10 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆12Updated 2 years ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- A DICOM honeypot for detecting and logging unauthorized access attempts☆40Updated 2 weeks ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- A database for storing, querying and doing stats on credential leaks☆38Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Capture screenshots of onion services on an onion service.☆49Updated 11 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆47Updated this week
- AIL project training materials☆30Updated 2 weeks ago
- ☆42Updated 2 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆34Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- A list of user agents belonging to common web scanners.☆40Updated 2 years ago
- ☆19Updated 6 months ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago