huuck / ADBHoneyView external linksLinks
Low interaction honeypot designed for Android Debug Bridge over TCP/IP
☆179Mar 5, 2025Updated 11 months ago
Alternatives and similar repositories for ADBHoney
Users that are interested in ADBHoney are comparing it to the libraries listed below
Sorting:
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆57Nov 23, 2018Updated 7 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Feb 13, 2017Updated 9 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆13Oct 10, 2018Updated 7 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Cowrie Honeypot Obscurer☆17Oct 14, 2020Updated 5 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- High Interaction Honeypot Solution for Redis protocol☆25Apr 23, 2021Updated 4 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Jan 15, 2020Updated 6 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- Native module dumper☆13Aug 28, 2017Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- Drupal Honeypot☆58Jul 14, 2019Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- Home of the dionaea honeypot☆788Aug 1, 2024Updated last year
- ☆34Jan 22, 2026Updated 3 weeks ago
- Credentials catching honeypot☆387May 21, 2024Updated last year
- PoC for detecting and dumping process hollowing code injection☆52Oct 23, 2018Updated 7 years ago
- cve-2019-0808-poc☆48Mar 25, 2019Updated 6 years ago
- catch log4j exploits in the wild? maybe if we're lucky... .☆16Aug 14, 2023Updated 2 years ago
- VoIP honeypot system☆21Apr 2, 2024Updated last year
- ☆20Jun 2, 2016Updated 9 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS).☆79May 10, 2018Updated 7 years ago
- FinSpy for Android technical analysis and tools☆60Oct 25, 2020Updated 5 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- A tool similar to netcat, but tunneled over DNS☆18Mar 10, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23May 21, 2024Updated last year
- FTP Honeypot☆33Jan 22, 2024Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆678Oct 28, 2023Updated 2 years ago
- Radare 2 wiki☆93Apr 24, 2020Updated 5 years ago
- cve-2018-10933 libssh authentication bypass☆109Feb 2, 2026Updated last week