tnich / honssh
HonSSH is designed to log all SSH communications between a client and server.
☆372Updated 3 years ago
Alternatives and similar repositories for honssh:
Users that are interested in honssh are comparing it to the libraries listed below
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Updated 2 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- A docker based honeypot.☆148Updated 9 years ago
- A low to medium interaction honeypot.☆462Updated 10 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago
- Tools for auditing WAFS☆457Updated 4 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- Probably one of the smallest SSL MITM proxies you can make☆181Updated 9 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆456Updated last year
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Malicious HTTP traffic explorer☆714Updated last year
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆431Updated 7 years ago
- Haka runtime☆447Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆240Updated last year
- A tool to fingerprint SSL/TLS servers☆266Updated 3 years ago
- Visualize statistics from a Kippo SSH honeypot☆133Updated last year
- Simulates enough of a Telnet connection in order to log failed login attempts.☆238Updated 7 years ago
- CERT Tapioca for MITM network analysis☆182Updated 8 months ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 7 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- Protect your Wireless Network from Evil Access Points!☆181Updated last year
- A webshell framework for penetration testers.☆296Updated 9 months ago
- A Linux packet crafting tool.☆464Updated 4 years ago
- Project Sonar☆236Updated last year