Spam trap management
☆23Jun 18, 2024Updated last year
Alternatives and similar repositories for spamcan
Users that are interested in spamcan are comparing it to the libraries listed below
Sorting:
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Node scripts to get, filter and import github repo data☆18Jun 25, 2022Updated 3 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 3 months ago
- Zeek scripting language highlighting/support for Sublime Text☆19Jul 20, 2021Updated 4 years ago
- A ADS-B "BEAST" TCP decoder server, in Go. Requires dump1090 or similar application with BEAST TCP output. •••••• THIS REPO LIVES AT THE …☆17Jul 3, 2017Updated 8 years ago
- [WIP] Search Engine☆11Aug 4, 2020Updated 5 years ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆17Aug 20, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- THP Forensic Challenges☆23Jul 28, 2023Updated 2 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆78Oct 6, 2019Updated 6 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Jul 10, 2018Updated 7 years ago
- ESF modular ingestion tool for development and research.☆38Dec 21, 2021Updated 4 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 3 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago