Your Friendly Neighbourhood Honeypot Maker and Manager
☆33Mar 20, 2019Updated 7 years ago
Alternatives and similar repositories for apate
Users that are interested in apate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- General tools and scripts i want to make public to the world.☆46Apr 14, 2019Updated 6 years ago
- Customisable PCAP parser and research assistant☆26Jan 8, 2018Updated 8 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆20Aug 6, 2018Updated 7 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- A Python Package for Data Exfiltration☆805Jul 2, 2025Updated 8 months ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Keeps track of what repos needs to be saved from the new Github " Exploits and malware policy"☆23May 15, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- A simple web gui for Transmission☆19Sep 25, 2010Updated 15 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- ☆10Oct 2, 2021Updated 4 years ago
- Mass report tool for social media platform Snapchat☆13Mar 14, 2023Updated 3 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆32May 5, 2017Updated 8 years ago
- ML research on software vulnerabilities☆18Sep 8, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- The docker image for nginx rtmp hls server.☆11Jan 6, 2021Updated 5 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- A Logstash neo4j output☆12Nov 8, 2021Updated 4 years ago
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Apr 3, 2019Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Node.js server that responds to github webhook post-receive events for easy push-to-deploy☆12Dec 28, 2020Updated 5 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- Small Backdoor/rootkit for linux kernel☆21Jan 26, 2014Updated 12 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 9 months ago