honeynet / shiva
Spam Honeypot with Intelligent Virtual Analyzer
☆17Updated 11 years ago
Alternatives and similar repositories for shiva
Users that are interested in shiva are comparing it to the libraries listed below
Sorting:
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A curated list of tools for incident response☆29Updated last year
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Service desk password tools.☆16Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Spam trap management☆23Updated 11 months ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Various pentest scripts☆13Updated 11 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- See here:☆42Updated 12 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- recon framework in ruby☆13Updated 13 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- A List of InfoSec Resources☆10Updated 10 years ago