honeynet / shiva
Spam Honeypot with Intelligent Virtual Analyzer
☆17Updated 11 years ago
Alternatives and similar repositories for shiva:
Users that are interested in shiva are comparing it to the libraries listed below
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- recon framework in ruby☆13Updated 13 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Service desk password tools.☆15Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Awesome little automater☆17Updated 12 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- See here:☆42Updated 12 years ago
- A curated list of tools for incident response☆29Updated last year
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 6 months ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆21Updated 9 years ago