lcashdol / WAPotLinks
A honeypot that can be used to observe traffic directed at home routers.
☆19Updated 6 years ago
Alternatives and similar repositories for WAPot
Users that are interested in WAPot are comparing it to the libraries listed below
Sorting:
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated last year
- Open Source Intelligence☆25Updated 8 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Get clients and access points.☆49Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆84Updated 10 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆64Updated 4 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆29Updated 8 years ago
- A few transforms and a machine for parsing Nmap XML results☆38Updated 9 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- ☆33Updated 5 months ago
- Detect leaks in security event logs.☆20Updated 6 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- Maltego integration of https://abusix.com☆17Updated 6 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Various exploits☆10Updated 8 years ago
- A Python Script To Automatically Download, Provision and Update a Kali Linux VM in Virtualbox☆46Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Updated 7 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆14Updated 7 years ago