lanjelot / twisted-honeypotsView external linksLinks
SSH, FTP and Telnet honeypots based on Twisted
☆87Dec 27, 2019Updated 6 years ago
Alternatives and similar repositories for twisted-honeypots
Users that are interested in twisted-honeypots are comparing it to the libraries listed below
Sorting:
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Feb 2, 2021Updated 5 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆140Mar 31, 2025Updated 10 months ago
- ☆10Aug 8, 2015Updated 10 years ago
- FTP Honeypot☆33Jan 22, 2024Updated 2 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Assists in mass exportation of Nessus scans☆20Apr 20, 2018Updated 7 years ago
- ☆16Apr 16, 2015Updated 10 years ago
- ☆11Feb 20, 2015Updated 10 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- observation camera honeypot☆53Jun 18, 2015Updated 10 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Sep 24, 2014Updated 11 years ago
- a radare2 plugin that decodes packets with Scapy☆33Nov 24, 2017Updated 8 years ago
- Albatar is a SQLi exploitation framework in Python☆137Jan 24, 2025Updated last year
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- Collection of tools that aid in red team operations☆25Aug 23, 2018Updated 7 years ago
- Burp Scanner XML Parser☆36Sep 24, 2014Updated 11 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆42Jun 26, 2017Updated 8 years ago
- Telnet Honeypot☆163Mar 5, 2019Updated 6 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- ☆27Dec 20, 2018Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Jun 29, 2016Updated 9 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- A Simple Elasticsearch Honeypot☆190Jul 14, 2015Updated 10 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- Occupy WiFi Firmware☆11Sep 14, 2015Updated 10 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 5 years ago
- ☆15Jan 20, 2016Updated 10 years ago