PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.
☆142Oct 1, 2025Updated 5 months ago
Alternatives and similar repositories for pentbox
Users that are interested in pentbox are comparing it to the libraries listed below
Sorting:
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Feb 19, 2021Updated 5 years ago
- ☆29Jul 26, 2017Updated 8 years ago
- Pwnagotchi settings, config files and plugins☆29Jan 10, 2025Updated last year
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆21Jun 12, 2021Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- ☆11May 13, 2024Updated last year
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- A very powerful tool for All kind of MITM attacks☆15Sep 7, 2023Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆11May 14, 2025Updated 9 months ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 5 years ago
- Bulk turn on Analytic rules in Azure Sentinel☆19Oct 7, 2021Updated 4 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- ☆13Jun 5, 2014Updated 11 years ago
- crawler for finding reflected parameters and reflecting special characters!☆21Dec 2, 2024Updated last year
- ☆42Dec 22, 2020Updated 5 years ago
- tryhame rooms walkthrough☆59Updated this week
- Generate Malicious QR or similar☆16Jun 7, 2023Updated 2 years ago
- Automated Wireless Attack Framework☆75Mar 18, 2019Updated 6 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Get hands-on with OSINT tools such as Recon-ng, Maltego, Shodan and Sherlock☆26May 23, 2024Updated last year
- tool to help you automate the evil twin attack in a specific, easy and quick way☆20Dec 14, 2024Updated last year
- DEDSEC_BKIF is a keystroke injection tool for Android, Linux, and iOS.☆24Jan 19, 2026Updated last month
- ☆20Jul 30, 2024Updated last year
- An interactive menu plugin for the pwnagotchi.☆22Jul 26, 2024Updated last year
- Improved version of quickdic.py - For pwnagotchi's devices☆20May 25, 2024Updated last year
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Custom Pwnagotchi python scripts☆18Feb 12, 2024Updated 2 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- A super fast multithreaded ports scanner that scans for open listening ports on the target server with multiple methods and user-specifie…☆23May 28, 2021Updated 4 years ago
- Interactive Arts 1; Installation & Immersive Environments - course repo. University of Montana, School of Media Arts☆14Aug 24, 2020Updated 5 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 6 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- ☆31May 22, 2023Updated 2 years ago
- ☆18Feb 27, 2024Updated 2 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year