HonSSH is designed to log all SSH communications between a client and server.
☆375Jan 2, 2022Updated 4 years ago
Alternatives and similar repositories for honssh
Users that are interested in honssh are comparing it to the libraries listed below
Sorting:
- Kippo - SSH Honeypot☆1,712Nov 19, 2023Updated 2 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Jan 6, 2015Updated 11 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- High-interaction MitM SSH honeypot☆173May 13, 2018Updated 7 years ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,211Updated this week
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- ☆49Mar 14, 2015Updated 10 years ago
- A simple and effective phpmyadmin honeypot☆68Feb 11, 2018Updated 8 years ago
- Honeypot deployment made easy☆237Mar 13, 2019Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆95Dec 23, 2020Updated 5 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- My personal hacklab, create your own.☆333Sep 30, 2022Updated 3 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆232Sep 23, 2015Updated 10 years ago
- ☆282Dec 5, 2017Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆240May 22, 2023Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- An SDN penetration testing toolkit☆117Oct 4, 2024Updated last year
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- A Framework for Comparing Password Guessing Strategies☆129Jul 11, 2019Updated 6 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆161Jul 27, 2020Updated 5 years ago