robertdavidgraham / telnetlogger
Simulates enough of a Telnet connection in order to log failed login attempts.
☆238Updated 7 years ago
Alternatives and similar repositories for telnetlogger:
Users that are interested in telnetlogger are comparing it to the libraries listed below
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆181Updated last year
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Visualize statistics from a Kippo SSH honeypot☆133Updated last year
- HonSSH is designed to log all SSH communications between a client and server.☆373Updated 3 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A webshell framework for penetration testers.☆297Updated 10 months ago
- A Github organization reconnaissance tool.☆216Updated last year
- Fancy Bear Source Code☆261Updated 8 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Updated 2 years ago
- HTTP Header Analysis Vulnerability Tool☆113Updated 4 years ago
- Cartero - Social Engineering Framework☆171Updated 4 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆97Updated 8 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆155Updated 9 years ago
- Nameserver DNS poisoning attacks made easy☆517Updated 7 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- pastebin.com Content Monitoring Tool☆193Updated 12 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- Automated Linux evil maid attack☆425Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- Malicious USB☆171Updated last year
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Capturing, analysing and responding to cyber attacks☆170Updated 5 months ago