Analyze and Visualize Data from Modern Honey Network Servers with R
☆15Jan 15, 2016Updated 10 years ago
Alternatives and similar repositories for mhn
Users that are interested in mhn are comparing it to the libraries listed below
Sorting:
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- ☆12Oct 2, 2022Updated 3 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- Somewhat Reliable PoC Exploit for CVE-2022-36804 (BitBucket Critical Command Injection)☆16Nov 23, 2023Updated 2 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 9 months ago
- Small tool to scan On-Premises Exchange servers, useful for analytical purposes and patch management☆20Aug 28, 2022Updated 3 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆20Dec 7, 2021Updated 4 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Repository for the Apache Drill Workshop☆19Oct 31, 2016Updated 9 years ago
- Example scripts for "Using web APIs in R" presentation, rstudio::conf 2017☆26Jul 12, 2017Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆30Dec 16, 2021Updated 4 years ago
- Methods workshop: Automated Text Analysis with R☆34May 19, 2016Updated 9 years ago
- ☆42Apr 22, 2021Updated 4 years ago
- A host based IDS written in C# Targetted at Metasploit☆44Nov 18, 2013Updated 12 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- Python scripts to audit and harden the 2014-2017 Microsoft SQL Server☆10Jun 5, 2020Updated 5 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Sep 8, 2021Updated 4 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Simple Spyder BOT Auto Exploit Mass Local File Disclosure Joomla ( Fix Speed ) <3☆10Nov 5, 2019Updated 6 years ago
- Ecological mixed-effects ordination with lme4☆12May 9, 2016Updated 9 years ago
- 70+ years of data on Network television. Attributes of shows, race & gender of cast members, directors, producers, presenters, etc.☆10May 21, 2024Updated last year
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Twitter Bots!☆10Sep 2, 2014Updated 11 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- Simple ftrl implementation in R for the AVAZU CTR Competition in R☆13Jan 21, 2015Updated 11 years ago