Spam trap management
☆24Jun 18, 2024Updated last year
Alternatives and similar repositories for spamcan
Users that are interested in spamcan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆60Dec 10, 2014Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- A repository for Shadow Daemon rules☆12Sep 2, 2020Updated 5 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Checkpot Honeypot Checker☆27Aug 13, 2018Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆140Mar 31, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- PHP Sandbox☆21Aug 13, 2023Updated 2 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- A git server implementation using isomorphic-git (WIP)☆15Dec 7, 2019Updated 6 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Simple DNS honeypot script☆51Jan 23, 2026Updated 2 months ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Oct 6, 2019Updated 6 years ago
- Give it a KiCad PCB file, it will extract all the parameters and find the cheapest/best PCB manufacturers for you.☆11Sep 18, 2016Updated 9 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- NTP logger/honeypot☆56Mar 27, 2014Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Client-side caching & SRI generation for Grunt☆10Apr 16, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Break rotational letter substitution (ROT) encoded text, right from your terminal.☆14Jan 5, 2023Updated 3 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Organizational system for a library☆11Updated this week