mmulazzani / HoneyConnectorLinks
☆32Updated 11 years ago
Alternatives and similar repositories for HoneyConnector
Users that are interested in HoneyConnector are comparing it to the libraries listed below
Sorting:
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Phishing Toolkit☆19Updated 7 years ago
- ☆12Updated 9 years ago
- ☆16Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.☆22Updated 3 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- ☆27Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 13 years ago
- ☆16Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Updated 11 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago