jordan-wright / dumpmon
Information Dump Monitor
☆596Updated 6 years ago
Related projects: ⓘ
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆623Updated 2 months ago
- Nameserver DNS poisoning attacks made easy☆515Updated 7 years ago
- Python Pastebin Webcrawler that returns list of public pastebins containing keywords☆422Updated 3 years ago
- Specify targets and run sets of tools against them☆377Updated 5 years ago
- A command line tool to detect shared passwords☆402Updated 7 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆759Updated 3 years ago
- A web front-end for password cracking and analytics☆619Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆817Updated 6 years ago
- Honeypot Intelligence with Splunk☆252Updated 5 years ago
- Malicious HTTP traffic explorer☆707Updated last year
- ☆423Updated 7 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆300Updated 2 years ago
- A low to medium interaction honeypot.☆458Updated 5 months ago
- A webshell framework for penetration testers.☆294Updated 5 months ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆334Updated 2 years ago
- A powerful and extensible wireless drop box☆264Updated 5 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆454Updated 11 months ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆518Updated last year
- Credentials catching honeypot☆371Updated 3 months ago
- HonSSH is designed to log all SSH communications between a client and server.☆372Updated 2 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆378Updated 4 years ago
- Protect your Wireless Network from Evil Access Points!☆180Updated last year
- Builds malware analysis Windows VMs so that you don't have to.☆1,027Updated 3 years ago
- A tool to retrieve malware directly from the source for security researchers.☆562Updated 7 years ago
- Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.☆471Updated 6 years ago
- A database of common, interesting or useful commands, in one handy referable form☆745Updated 7 months ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆326Updated 3 years ago