mushorg / oschameleonLinks
OS Fingerprint Obfuscation for modern Linux Kernels
☆77Updated last year
Alternatives and similar repositories for oschameleon
Users that are interested in oschameleon are comparing it to the libraries listed below
Sorting:
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- A Network Inspection Tool☆82Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- YAPDNS☆39Updated 10 years ago
- A warehouse for your malware☆133Updated 12 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- ☆49Updated 10 years ago
- ☆46Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Passive DNS V2☆60Updated 11 years ago
- NTP logger/honeypot☆54Updated 11 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 9 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- A honeypot for malware that propagates via USB storage devices☆98Updated 10 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Leak File Analyzer☆62Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago