PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.
☆145Oct 1, 2025Updated 5 months ago
Alternatives and similar repositories for pentbox
Users that are interested in pentbox are comparing it to the libraries listed below
Sorting:
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Feb 19, 2021Updated 5 years ago
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆21Jun 12, 2021Updated 4 years ago
- This is a program written in python which allows you to log in with different sql injections that allow you to bypass some login pages (F…☆12Feb 23, 2023Updated 3 years ago
- Shellphish is created by TheLinuxChoice but after the repository deleted we recreate this. To know how to use shellphish visit our websit…☆98Jul 5, 2020Updated 5 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 10 months ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- ☆26Sep 1, 2022Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- A very powerful tool for All kind of MITM attacks☆15Sep 7, 2023Updated 2 years ago
- metasploit v6.1.36-dev-a59aa86 من صدام الشرعبي☆15Apr 3, 2022Updated 3 years ago
- Enchant is is tool aimed to discover web application directory and pages by fuzzing the requests using a dictionary approach.☆25Oct 5, 2015Updated 10 years ago
- tryhame rooms walkthrough☆62Feb 22, 2026Updated 3 weeks ago
- Flipper Zero firmware and remote archive management☆22Mar 11, 2026Updated last week
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- PhoneFy un simple script para obtener informacion de un telefono☆11Nov 5, 2021Updated 4 years ago
- A PoC exploit for CVE-2023-51467 - Apache OFBiz Authentication Bypass☆12Dec 31, 2023Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Jul 13, 2021Updated 4 years ago
- Improved version of quickdic.py - For pwnagotchi's devices☆20May 25, 2024Updated last year
- You can use this tool To do pranks but don't use this tool to harm anyone. Using this tool carelessly will cause a lot of trouble like if…☆16Aug 8, 2021Updated 4 years ago
- ☆13Apr 14, 2024Updated last year
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Jul 30, 2024Updated last year
- Online firmware patcher based on k5_v2.01.26 firmware version as target for the Quansheng UV-K5 radio and it's variants. Real newer fw ve…☆15Sep 5, 2023Updated 2 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- Wordlist compiled from Twitter usernames☆18Aug 15, 2022Updated 3 years ago
- Custom Pwnagotchi python scripts☆18Feb 12, 2024Updated 2 years ago
- endlessh auto reporting IPs to abuseipdb.com☆16Jan 15, 2025Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago