mushorg / buttinsky
Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will provide an open source framework for automated botnet monitoring. The modular design will allow full customization of the used protocols, the monitoring clients behavior, how we log the collected information, proc…
☆81Updated 11 years ago
Alternatives and similar repositories for buttinsky:
Users that are interested in buttinsky are comparing it to the libraries listed below
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- ☆27Updated 7 years ago
- See here:☆42Updated 12 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆20Updated 8 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago