Spam trap management
☆24Jun 18, 2024Updated last year
Alternatives and similar repositories for spamcan
Users that are interested in spamcan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Node scripts to get, filter and import github repo data☆18Jun 25, 2022Updated 3 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆140Mar 31, 2025Updated 11 months ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆20May 26, 2021Updated 4 years ago
- A git server implementation using isomorphic-git (WIP)☆15Dec 7, 2019Updated 6 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Oct 6, 2019Updated 6 years ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated this week
- THP Forensic Challenges☆23Jul 28, 2023Updated 2 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- Client-side caching & SRI generation for Grunt☆10Apr 16, 2023Updated 2 years ago
- The censorship monitoring project (blocked.org.uk) API, database and message-queueing system☆26Feb 27, 2026Updated 3 weeks ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- ☆76Jun 5, 2018Updated 7 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- A mapping of used malware names to commonly known family names☆63Feb 21, 2023Updated 3 years ago
- Organizational system for a library☆11Jun 11, 2024Updated last year
- ☆10Jul 24, 2020Updated 5 years ago
- public exploits☆36May 11, 2023Updated 2 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago