joda32 / owa-honeypot
A basic flask based Outlook Web Honey pot
☆66Updated last year
Alternatives and similar repositories for owa-honeypot:
Users that are interested in owa-honeypot are comparing it to the libraries listed below
- Traps web spiders☆65Updated 4 years ago
- Docker container for the gophish phishing framework.☆46Updated 2 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆190Updated 3 weeks ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆215Updated 3 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆33Updated this week
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆64Updated last month
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- Malware vulnerability intel tool for third-party attackers☆115Updated 3 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆56Updated last year
- ☆32Updated 2 months ago
- Python API for interacting with sigma rules.☆49Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆118Updated 2 years ago
- ☆36Updated 6 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆97Updated 6 months ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆279Updated 3 months ago
- ☆79Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆31Updated 6 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆45Updated 9 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆159Updated 3 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- ☆102Updated last year
- SANS Slingshot Linux Distribution☆45Updated 4 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆251Updated 2 years ago
- ☆101Updated 3 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆109Updated 7 months ago