damn simple honey pot
☆19May 31, 2016Updated 9 years ago
Alternatives and similar repositories for dshp
Users that are interested in dshp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- ☆11Oct 14, 2016Updated 9 years ago
- This tool helps #blueteams detect bad actors who may be port scanning the network, and allows #redteams to practice honeypot evasion.☆11Oct 20, 2020Updated 5 years ago
- Knapsack algorithms☆10Dec 23, 2018Updated 7 years ago
- OpenFlow Honeypot☆24Jan 5, 2013Updated 13 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆17Nov 23, 2025Updated 4 months ago
- Distributed Honeypot☆63Apr 29, 2018Updated 7 years ago
- Bluetooth Recon Script☆24Nov 3, 2015Updated 10 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- ☆12Mar 18, 2026Updated last week
- Speak raspberry pi`s ip address.☆10Oct 6, 2016Updated 9 years ago
- [ARCHIVED] IPFS Stress tests☆10Apr 16, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hack plugins for Kibana☆12Aug 20, 2016Updated 9 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Pyramid is a real-time multiplayer 3D platform game from scratch.☆12Jul 25, 2016Updated 9 years ago
- Lists capabilities used by processes on your system as they are requested, to assist in the task of creating custom hardened profiles for…☆13Jul 24, 2025Updated 8 months ago
- A simple Docker setup for a Flask application on Nginx☆15Jul 11, 2020Updated 5 years ago
- Honeypot detection toolkit☆11Feb 10, 2026Updated last month
- An AWK guide with examples☆10Aug 3, 2020Updated 5 years ago
- A port of the Python subprocess module to Lua☆17Nov 1, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/corkami☆14Mar 14, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OpenGL scene graph gfx api for NodeJS & Browser☆27Aug 7, 2014Updated 11 years ago
- A single server multiple workers distributed architecture that supports HTTP requests on the scheduler and translates them to GRPC reques…☆13Apr 11, 2022Updated 3 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- A reverse proxy which validates access using JWT.☆12Mar 22, 2023Updated 3 years ago
- Implementation of Space Invaders in JavaScript☆13Mar 18, 2024Updated 2 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- Streaming Log Multiplexer - combine multiple logs to one☆11Jan 4, 2023Updated 3 years ago
- Dockerization of brat application☆13Jun 13, 2018Updated 7 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Identifying author profile including age and gender from texts☆17Nov 18, 2015Updated 10 years ago
- Free simple and modern Linux botnet with a nice and secure PHP panel.☆10Dec 25, 2019Updated 6 years ago
- crash poc & Leak info PoC☆17Mar 19, 2018Updated 8 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- A package for R that bundles several Shiny web applications for educational use.☆13Feb 12, 2020Updated 6 years ago