mushorg / buttinsky
Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will provide an open source framework for automated botnet monitoring. The modular design will allow full customization of the used protocols, the monitoring clients behavior, how we log the collected information, proc…
☆79Updated 11 years ago
Related projects: ⓘ
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- ☆51Updated this week
- ☆26Updated 7 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- ☆22Updated this week
- Pastenum is a text dump enumeration tool.☆14Updated 10 years ago
- ☆14Updated this week
- Cross Distribution Exploit Testing☆27Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 8 years ago
- ☆21Updated this week
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Updated last year
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆55Updated 9 years ago
- ☆12Updated this week
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- ☆27Updated this week
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆42Updated 9 years ago