Fake sshd that logs ip addresses, usernames, and passwords.
☆203Jan 4, 2017Updated 9 years ago
Alternatives and similar repositories for ssh-honeypot
Users that are interested in ssh-honeypot are comparing it to the libraries listed below
Sorting:
- Tweets metadata scraper & activity analyzer☆2,977Nov 14, 2023Updated 2 years ago
- Decrypted content of eqgrp-auction-file.tar.xz☆4,198May 24, 2017Updated 8 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,986Apr 14, 2017Updated 8 years ago
- ☆10Aug 9, 2024Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Phishing catcher using Certstream☆1,791Aug 13, 2024Updated last year
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆411May 8, 2023Updated 2 years ago
- This program focuses on automating the download, installation and compilation of pentest tools from source☆33Oct 30, 2018Updated 7 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Oct 16, 2014Updated 11 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 8 months ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆186Jun 23, 2024Updated last year
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- 采集乌云已确认漏洞和已公开漏洞的状态、厂商、Rank等数据用于分析哪些是良心厂商☆14Jan 3, 2017Updated 9 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- [BASH] Wardriving tool. Collect all the Wi-Fi wireless networks in a log file (csv format) skipping duplicate.☆18Jun 4, 2011Updated 14 years ago
- Credentials catching honeypot☆389May 21, 2024Updated last year
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 10 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Dec 8, 2019Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Small Project :)☆18Oct 27, 2019Updated 6 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- This is a GUI for the projet https://github.com/PowerShellEmpire/Empire☆16Jun 19, 2017Updated 8 years ago
- Remote administration service which uses twitter as a command and control server☆721Feb 25, 2021Updated 5 years ago