lanjelot / twisted-honeypots
SSH, FTP and Telnet honeypots based on Twisted
☆86Updated 5 years ago
Alternatives and similar repositories for twisted-honeypots:
Users that are interested in twisted-honeypots are comparing it to the libraries listed below
- A reverse shell cheat-sheet tool☆39Updated 6 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆68Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- observation camera honeypot☆50Updated 9 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Updated 8 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated 2 months ago
- Rogue AP killer☆89Updated 7 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- bap - http Basic Authentication honeyPot☆49Updated 10 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆45Updated 7 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- Telnet Honeypot☆161Updated 6 years ago
- ☆22Updated 8 years ago
- Splunk Web Shell☆51Updated 10 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Attack Knowledge Base☆100Updated 7 years ago