lanjelot / twisted-honeypots
SSH, FTP and Telnet honeypots based on Twisted
☆83Updated 4 years ago
Related projects: ⓘ
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆104Updated 9 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆56Updated 11 years ago
- Easy 802.1Q VLAN Hopping☆79Updated last month
- ☆57Updated this week
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆55Updated 9 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆82Updated 2 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Search drives for documents containing passwords☆61Updated 10 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆64Updated 5 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆46Updated 3 years ago
- unix wildcard attacks☆130Updated 6 years ago
- A Metasploit auto auxiliary script☆102Updated last year
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆52Updated 4 years ago
- bap - http Basic Authentication honeyPot☆46Updated 9 years ago
- ☆85Updated 9 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆67Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated last year
- Shell-style script to search exploit-db.com exploits.☆59Updated last week
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- ☆72Updated this week
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆124Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆54Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆73Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 6 years ago
- Created by Jeffrey Martin via the GitHub Connector☆49Updated 11 months ago