Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will provide an open source framework for automated botnet monitoring. The modular design will allow full customization of the used protocols, the monitoring clients behavior, how we log the collected information, proc…
☆81Jun 4, 2013Updated 12 years ago
Alternatives and similar repositories for buttinsky
Users that are interested in buttinsky are comparing it to the libraries listed below
Sorting:
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Spam trap management☆23Jun 18, 2024Updated last year
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- A Network Inspection Tool☆82Oct 13, 2017Updated 8 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Panic button for protection against cold boot attacks☆146Feb 7, 2022Updated 4 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Dec 27, 2021Updated 4 years ago
- ☆27Jul 18, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Oct 6, 2019Updated 6 years ago