lanjelot / twisted-honeypotsLinks
SSH, FTP and Telnet honeypots based on Twisted
☆86Updated 5 years ago
Alternatives and similar repositories for twisted-honeypots
Users that are interested in twisted-honeypots are comparing it to the libraries listed below
Sorting:
- unix wildcard attacks☆134Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- ☆86Updated 10 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- A reverse shell cheat-sheet tool☆39Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- A simple and effective phpmyadmin honeypot☆67Updated 7 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- ☆61Updated 7 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- a collection of Metasploit PoC exploits I wrote for IRC Botnets that allows RCE☆78Updated 2 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Updated 9 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆69Updated 9 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago