sa7mon / miniprintLinks
A medium interaction printer honeypot π―
β202Updated 2 years ago
Alternatives and similar repositories for miniprint
Users that are interested in miniprint are comparing it to the libraries listed below
Sorting:
- This repo contains logstash of various honeypotsβ174Updated 5 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wiresharkβ100Updated 6 years ago
- A script that automates generation of OpenSSL reverse shellsβ302Updated 4 years ago
- Hamburglar -- collect useful information from urls, directories, and filesβ319Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all pβ¦β168Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMTβ258Updated 4 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emailsβ120Updated 3 years ago
- penetration testing scriptsβ136Updated 6 years ago
- CERT Tapioca for MITM network analysisβ183Updated last year
- β οΈWARNING: This project now become part of https://github.com/j3ssie/Metabigor projectβ177Updated 6 years ago
- Various Tools and Docker Imagesβ280Updated 4 months ago
- A testing framework for mail security and filtering solutions.β245Updated 2 years ago
- AI-based, context-driven network device rankingβ300Updated last year
- Orc is a post-exploitation framework for Linux written in Bashβ397Updated 5 years ago
- Detect silent (unwanted) changes to files on your systemβ160Updated 5 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.β153Updated 4 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websitesβ174Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shellβ238Updated 2 years ago
- Code + documentation for the public GreyNoise APIβ314Updated 4 years ago
- Python automation of Docker.sock abuseβ212Updated 2 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sourcesβ99Updated 7 years ago
- Pattern Extractor for Obfuscated Codeβ299Updated 3 years ago
- β138Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP binβ93Updated 4 years ago
- Golang IPv6 address enumerationβ363Updated 6 years ago
- Interface to manage and centralize Google Alert informationβ231Updated 2 years ago
- Small CTF challenges running on Dockerβ159Updated 7 years ago
- Nmap Script to scan for Winnti infectionsβ70Updated 7 years ago
- This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.β246Updated 3 years ago
- I wrote a book about privacy and OPSEC, so here it is.β67Updated 6 years ago