joshrendek / threat.gg-agentLinks
A SSH Server in Go that logs username/password combos
☆38Updated last year
Alternatives and similar repositories for threat.gg-agent
Users that are interested in threat.gg-agent are comparing it to the libraries listed below
Sorting:
- ☆66Updated 10 years ago
- Self contained cross platform DNS recon tool☆187Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - Linux Audit Plugin for heka written using netlink Protocol in golang and Lua☆74Updated 6 years ago
- Virustotal API for Go☆65Updated 6 years ago
- framework for a high interaction SSH honeypot☆39Updated 5 years ago
- Freki is a tool to manipulate packets in usermode using NFQUEUE and golang.☆59Updated 2 years ago
- Tagging and annotation framework for scan data☆101Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- A fast SSL/TLS reconnaisance tool written in Go☆59Updated 9 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆58Updated 8 years ago
- CVE feed synchronization to issue management system☆58Updated 10 years ago
- RESTful interface to your operating system shell☆19Updated 8 years ago
- INACTIVE - http://mzl.la/ghe-archive - go package for interfacing with Linux audit☆91Updated 5 years ago
- PassiveDNS in Go☆125Updated 6 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- honeypot go lang emulators☆11Updated 9 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆105Updated 7 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 8 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- DNS Reverse Proxy☆191Updated 4 months ago
- Gets the list of TOR exit nodes and matches them with Project Honeypot data☆65Updated 11 years ago
- YAPDNS☆39Updated 10 years ago
- AuthTables is a microservice that helps detect "Account Take Over" caused by simple credential theft. If bad actors are stealing your use…☆230Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- 🐛 🕳 Transparent TCP redirection. Makes a wormhole between one TCP socket to another transparently. Can be used to redirect SSH, MySQL…☆41Updated 4 years ago
- Automate SSH key management☆66Updated 3 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Updated 10 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Updated 6 years ago
- Distributed filesystem scanner☆132Updated 7 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Updated 5 years ago