sa7mon / miniprint
A medium interaction printer honeypot π―
β202Updated last year
Alternatives and similar repositories for miniprint:
Users that are interested in miniprint are comparing it to the libraries listed below
- Python automation of Docker.sock abuseβ212Updated 2 years ago
- This repo contains logstash of various honeypotsβ174Updated 5 years ago
- A script that automates generation of OpenSSL reverse shellsβ300Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMTβ257Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bashβ395Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shellβ237Updated 2 years ago
- Detect silent (unwanted) changes to files on your systemβ160Updated 5 years ago
- CERT Tapioca for MITM network analysisβ183Updated 11 months ago
- A testing framework for mail security and filtering solutions.β244Updated last year
- generate reverse shell from CLI for linux and Windows.β245Updated 4 years ago
- Hamburglar -- collect useful information from urls, directories, and filesβ319Updated 2 years ago
- Various Tools and Docker Imagesβ280Updated last week
- Discover target social media profilesβ81Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all pβ¦β169Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.β152Updated 4 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wiresharkβ101Updated 5 years ago
- β οΈWARNING: This project now become part of https://github.com/j3ssie/Metabigor projectβ178Updated 5 years ago
- Very crude and poorly written HTTP(s) and SMTP binβ93Updated 4 years ago
- an asynchronous target enumeration toolβ244Updated 2 years ago
- A simple embedded Linux backdoor.β199Updated 4 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.β244Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed overβ¦β387Updated 6 years ago
- NebulousAD automated credential auditing tool.β155Updated 5 years ago
- Pypykatz serverβ125Updated 6 years ago
- Respounder detects presence of responder in the network.β316Updated 5 years ago
- GTRS - Google Translator Reverse Shellβ615Updated 6 months ago
- Pattern Extractor for Obfuscated Codeβ298Updated 3 years ago
- Elasticsearch for Offensive Securityβ141Updated 4 years ago
- Open source offensive security platform for red team, by red team.β384Updated 7 years ago
- CURRYFINGER - SNI & Host header spoofing utility.β109Updated 5 years ago