lanjelot / twisted-honeypots
SSH, FTP and Telnet honeypots based on Twisted
☆86Updated 5 years ago
Alternatives and similar repositories for twisted-honeypots:
Users that are interested in twisted-honeypots are comparing it to the libraries listed below
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆56Updated 10 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Updated 10 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Pcap (capture file) Analysis Toolkit(v.1)☆105Updated 7 years ago
- ☆85Updated 9 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated last year
- A short and small memory forensics helper.☆52Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆55Updated 4 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- unix wildcard attacks☆132Updated 6 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆105Updated 4 years ago
- Malware Repository Framework☆100Updated 6 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆48Updated 3 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- WhiteBox CMS analysis☆69Updated last year
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆55Updated 5 years ago
- Telnet Honeypot☆160Updated 5 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 7 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago