SSH, FTP and Telnet honeypots based on Twisted
☆87Dec 27, 2019Updated 6 years ago
Alternatives and similar repositories for twisted-honeypots
Users that are interested in twisted-honeypots are comparing it to the libraries listed below
Sorting:
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Feb 2, 2021Updated 5 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Organise and access data collected during internal network pentests☆10Jun 4, 2020Updated 5 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆140Mar 31, 2025Updated 11 months ago
- ☆10Aug 8, 2015Updated 10 years ago
- FTP Honeypot☆34Jan 22, 2024Updated 2 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- ☆16Apr 16, 2015Updated 10 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- observation camera honeypot☆53Jun 18, 2015Updated 10 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- Albatar is a SQLi exploitation framework in Python☆137Jan 24, 2025Updated last year
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- Burp Scanner XML Parser☆36Sep 24, 2014Updated 11 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- Telnet Honeypot☆163Mar 5, 2019Updated 7 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆73Jun 29, 2016Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Golang command line tool for the macOS Endpoint Security Framework☆29Nov 25, 2019Updated 6 years ago
- A Simple Elasticsearch Honeypot☆190Jul 14, 2015Updated 10 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- This website is dedicated to Awesome.☆12Apr 23, 2020Updated 5 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- ☆15Jan 20, 2016Updated 10 years ago