HoneyPot Orchestration
☆11Aug 3, 2023Updated 2 years ago
Alternatives and similar repositories for honeyswarm
Users that are interested in honeyswarm are comparing it to the libraries listed below
Sorting:
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- 🍛 TypeScript Options-object Currying☆13Dec 9, 2019Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- A simple letsencrypt client in ruby☆10Apr 11, 2018Updated 7 years ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Simple Chrome Extension to Add Check Marks in Gmail ✓✓☆11May 3, 2018Updated 7 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- CI/CD Co-located ハンズオンイベントのドキュメントです。☆10Nov 1, 2021Updated 4 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- React UI☆11Jan 4, 2023Updated 3 years ago
- Elasticsearch to CSV Python Script☆11Jan 28, 2014Updated 12 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Python library for extracting version from poetry pyproject.toml file☆12Nov 21, 2021Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Jul 16, 2020Updated 5 years ago
- Merge multiple regexes and strings into one, preserving all the flags, automatically escaping the strings☆14Aug 27, 2024Updated last year
- Web Application Exploitation Environment☆11Jun 27, 2018Updated 7 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Helpers for getting CHN up and running through the Quickstart guide☆12Mar 2, 2021Updated 5 years ago
- A STUN server in Java with no dependencies☆11Jan 16, 2017Updated 9 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- The undocumented API for reporting sites to Safe Browsing☆11Jun 3, 2020Updated 5 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago