mushorg / oschameleon
OS Fingerprint Obfuscation for modern Linux Kernels
☆76Updated 11 months ago
Alternatives and similar repositories for oschameleon:
Users that are interested in oschameleon are comparing it to the libraries listed below
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- A honeypot for malware that propagates via USB storage devices☆96Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Rogue AP killer☆89Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- Subdomain Analyzer☆76Updated 8 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Maltese - Malware Traffic Emulator☆26Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 9 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 3 years ago
- Leak File Analyzer☆62Updated 7 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Snort Rules☆19Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Transparent network tap☆116Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- A warehouse for your malware☆134Updated 11 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 5 years ago