honeynet / shiva
Spam Honeypot with Intelligent Virtual Analyzer
☆17Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for shiva
- Investigation data from two reports around the Blue Coat networking kit.☆18Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆40Updated 13 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Service desk password tools.☆15Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Various pentest scripts☆14Updated 10 years ago
- recon framework in ruby☆13Updated 12 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- This is a copy of the Registry Decoder Live repository from Google Code☆9Updated 9 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- A curated list of tools for incident response☆27Updated 8 months ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Extract useful information from a Twitter account.☆34Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 4 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- an autodialer written in nodejs using the twilio api (not functional)☆11Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 10 years ago
- Network white noise collector☆18Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago