honeynet / whisperpot
VoIP honeypot system
☆13Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for whisperpot
- ☆21Updated 9 months ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆47Updated 3 months ago
- Yet another OSINT automator.☆19Updated 3 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆13Updated 2 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Updated 4 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆12Updated 8 months ago
- ☆14Updated 3 years ago
- ☆17Updated 7 months ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago
- Scripts related to offensiveosint.io☆20Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- VNCBruteForce - Brute Force attacks VNC with Hydra.☆21Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆10Updated last year
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆11Updated 9 months ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆14Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 5 months ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆14Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- Another vulnerability scanner☆17Updated last year
- Scan and decode NetWire logs☆11Updated 2 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A simple log parser for Suricata log file (JSON)☆8Updated last year
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- Extracted data & informations from the Conti & TrickBot leaks.☆14Updated 2 years ago