magisterquis / sshhipotView external linksLinks
High-interaction MitM SSH honeypot
☆172May 13, 2018Updated 7 years ago
Alternatives and similar repositories for sshhipot
Users that are interested in sshhipot are comparing it to the libraries listed below
Sorting:
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Jan 2, 2022Updated 4 years ago
- Simple SSH brute-forcer written in Go☆23May 29, 2016Updated 9 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 8 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- ☆128Jul 17, 2015Updated 10 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- S2-046-PoC☆112Mar 21, 2017Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Reverse TCP Port to UDP Forwarding Tools☆161Nov 11, 2016Updated 9 years ago
- ☆113Jun 5, 2017Updated 8 years ago
- a fast domain brute tool☆414Mar 2, 2018Updated 7 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Aug 8, 2012Updated 13 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Exploit code developed/reproduced by me☆90Jan 25, 2023Updated 3 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆266Jan 3, 2022Updated 4 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Apr 7, 2018Updated 7 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- ☆212Apr 17, 2017Updated 8 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆822Dec 6, 2017Updated 8 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- ☆49Jan 11, 2019Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆304Oct 27, 2017Updated 8 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- WhichCDN allows to detect if a given website is protected by a Content Delivery Network☆150May 5, 2017Updated 8 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Feb 25, 2023Updated 2 years ago
- Paskto - Passive Web Scanner☆150Dec 28, 2018Updated 7 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago