travisbgreen / intel_amt_honeypotView external linksLinks
intel amt honeypot
☆18May 9, 2017Updated 8 years ago
Alternatives and similar repositories for intel_amt_honeypot
Users that are interested in intel_amt_honeypot are comparing it to the libraries listed below
Sorting:
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Simple, useful scripts for red/blue team situations☆22May 4, 2015Updated 10 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- 基于zoomeye的思路制作的小型空间引擎及攻击模型☆16Jun 4, 2017Updated 8 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- reversed emet tool☆24Oct 14, 2012Updated 13 years ago
- ☆13Feb 25, 2014Updated 11 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- Modbus stager in assembly and some scripts to upload/download data to the holding register of a PLC☆44Jun 10, 2020Updated 5 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Jun 6, 2016Updated 9 years ago
- domain for website☆40Dec 21, 2011Updated 14 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- lcx in python edition☆28Oct 27, 2017Updated 8 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated last month
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆27Jun 23, 2016Updated 9 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- Selective Non-Invasive Active Monitoring for ICS Intrusion Detection: A Siemens S7 IDS☆26Dec 7, 2023Updated 2 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- This was a project to create an android based wifi cracking tool as a proof of concept. It seemed to work well.☆30Aug 3, 2014Updated 11 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- BGP Route Leaks Detection☆71Dec 7, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Mar 30, 2016Updated 9 years ago
- [Python] Google Scraper & Mass Exploiter☆30Aug 17, 2021Updated 4 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- CVE-2017-7494 - Detection Scripts☆63May 26, 2017Updated 8 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago