mushorg / buttinsky
Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will provide an open source framework for automated botnet monitoring. The modular design will allow full customization of the used protocols, the monitoring clients behavior, how we log the collected information, proc…
☆79Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for buttinsky
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- ☆15Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆56Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- A better SSL cipher checker using gnutls☆27Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago