securitygeneration / Honeyport
Bash and Python Honeyport scripts
☆41Updated 7 years ago
Related projects: ⓘ
- Modern Honey Network App for Splunk☆50Updated 4 years ago
- ☆61Updated 6 years ago
- Credential Phish Analysis and Automation☆93Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 6 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆51Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆40Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆61Updated 8 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 5 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 6 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Updated 7 years ago
- GreyNoise Query Language☆78Updated 5 years ago
- A powershell script for creating a Windows honeyport.☆87Updated 8 years ago
- Honeypot (Dionaea and kippo) setup script☆81Updated 7 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆112Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.☆65Updated 6 years ago
- Honeybadger Red Edition☆13Updated 7 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆25Updated 9 years ago
- A tool to generate graph and other output from NMAP XML files☆113Updated 5 years ago
- ☆27Updated this week
- A modified version of Mike Czumak's enumeration scanner☆19Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- pastebin.com Content Monitoring Tool☆192Updated 11 years ago
- A toolkit for Security Researchers☆124Updated 5 years ago
- NCC Group Ransomware Simulator☆66Updated 8 years ago
- ☆33Updated this week
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆6Updated 5 years ago
- Different tools, koen.vanimpe@cudeso.be☆93Updated 6 months ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆78Updated 8 years ago