stamparm / hontel
Telnet Honeypot
☆160Updated 6 years ago
Alternatives and similar repositories for hontel:
Users that are interested in hontel are comparing it to the libraries listed below
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Botnet command & control monitor☆191Updated 2 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- ☆127Updated 9 years ago
- Open Source Telnet Honeypot☆104Updated 8 years ago
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆90Updated 8 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- IPV6 MITM attack tool☆92Updated 11 years ago
- Suricata rules for Emerging Threats and funkyness☆74Updated 7 years ago
- Honeypot deployment made easy☆235Updated 6 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆160Updated 5 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- Python telnet honeypot for catching botnet binaries☆305Updated last year
- Next Generation Firewall Audit and Bypass Tool☆264Updated 7 years ago
- Tools for security challenges☆105Updated last month
- The first open source vulnerability scanner for firmwares☆194Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- An IRC based tool for testing the capabilities of a botnet.☆141Updated 4 years ago
- a linux process hacker tool☆83Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- A JBoss script for obtaining remote shell access☆170Updated 4 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- ☆138Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago