mushorg / buttinskyLinks
Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will provide an open source framework for automated botnet monitoring. The modular design will allow full customization of the used protocols, the monitoring clients behavior, how we log the collected information, proc…
☆81Updated 12 years ago
Alternatives and similar repositories for buttinsky
Users that are interested in buttinsky are comparing it to the libraries listed below
Sorting:
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- ☆27Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Exploits and research stuffs☆56Updated 2 weeks ago
- See here:☆43Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago