lanjelot / twisted-honeypots
SSH, FTP and Telnet honeypots based on Twisted
☆86Updated 5 years ago
Alternatives and similar repositories for twisted-honeypots:
Users that are interested in twisted-honeypots are comparing it to the libraries listed below
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- bap - http Basic Authentication honeyPot☆48Updated 10 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated last month
- unix wildcard attacks☆131Updated 6 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆79Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- BSidesCBR CTF docker compose files☆67Updated 4 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- observation camera honeypot☆50Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆149Updated 6 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆128Updated 6 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆68Updated 8 years ago
- A shellcode testing harness.☆69Updated 8 months ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 7 years ago