tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.
☆36Aug 28, 2020Updated 5 years ago
Alternatives and similar repositories for tcppc-go
Users that are interested in tcppc-go are comparing it to the libraries listed below
Sorting:
- ☆10Jan 21, 2022Updated 4 years ago
- ☆14Jun 7, 2018Updated 7 years ago
- Use MySQL honeypot to get wechat ID☆217Mar 23, 2021Updated 4 years ago
- A golang client of our webshell scanner API☆28Mar 9, 2018Updated 8 years ago
- Syclover PPT☆30May 22, 2017Updated 8 years ago
- Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆17Apr 17, 2023Updated 2 years ago
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆17Feb 6, 2025Updated last year
- NoSQLInjectionAttackDemo is website demo for test NoSQL Injection. There are two website demos in this project and all databases are mong…☆41Nov 26, 2016Updated 9 years ago
- ☆14Sep 2, 2021Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Godzilla v1.0 source code☆38Aug 26, 2020Updated 5 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- ☆46Jan 2, 2022Updated 4 years ago
- hackcode exp poc and crawler☆22Oct 20, 2017Updated 8 years ago
- 此项目为su18大佬的仓库镜像,如有问题可发issuse删库☆14May 4, 2023Updated 2 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- ☆15Nov 12, 2021Updated 4 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- ☆11May 22, 2023Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- a simple tool to detect potential security threat in php code☆316Sep 9, 2024Updated last year
- A free implementation of DCE RPC, with development aimed at implementing DCOM for Linux (and other UNIX systems).☆10Sep 5, 2013Updated 12 years ago
- MySQL fake server for read files of connected clients☆606Jul 23, 2017Updated 8 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- 绿盟科技漏洞扫描器(RSAS)漏洞库☆367May 30, 2019Updated 6 years ago
- 通过Web获取访客机器的hostname字段内容。☆65Oct 19, 2021Updated 4 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Windows Privilege Escalation☆10Dec 27, 2014Updated 11 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- golang 贝叶斯算法训练过滤敏感词,用了多项式模型和伯努利模型☆12Oct 16, 2019Updated 6 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- PHP Fval(say F-word to eval) extension used to disable unsafe functions/eval with E_FATAL.☆17Sep 12, 2017Updated 8 years ago
- Solana Dex Info for arbitrage bot☆18Sep 6, 2025Updated 6 months ago
- 百宝箱☆464Jul 19, 2024Updated last year
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆54Jun 25, 2020Updated 5 years ago
- W5 SOAR 开源前端☆19Oct 17, 2023Updated 2 years ago