philcryer / prickly-peteLinks
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
☆35Updated 10 months ago
Alternatives and similar repositories for prickly-pete
Users that are interested in prickly-pete are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- AYY LMAO☆22Updated 9 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Faraday Continuous Scanning☆34Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- ☆25Updated 8 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 11 months ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- ☆46Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- post-exploitation tools☆15Updated 7 years ago
- observation camera honeypot☆50Updated 10 years ago
- Python API for URL Query☆35Updated 9 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago