joda32 / owa-honeypotLinks
A basic flask based Outlook Web Honey pot
☆67Updated 2 years ago
Alternatives and similar repositories for owa-honeypot
Users that are interested in owa-honeypot are comparing it to the libraries listed below
Sorting:
- ☆35Updated 7 months ago
- Traps web spiders☆75Updated 5 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆25Updated 2 years ago
- Veil-PowerView is a powershell tool to gain network situational awareness on Windows domains.☆58Updated 10 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- ☆36Updated 11 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆164Updated 8 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated this week
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆33Updated 11 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆113Updated last year
- ☆112Updated 4 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆112Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆102Updated last year
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆57Updated last month
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Updated 6 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆74Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated 4 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆227Updated 8 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- ☆121Updated last year
- ☆104Updated last year
- Publicly-available tools from Rogue Valley Information Security☆14Updated 4 months ago
- Password list generator for password spraying - prebaked with goodies☆104Updated 2 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year