ytisf / apate
Your Friendly Neighbourhood Honeypot Maker and Manager
☆33Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for apate
- General tools and scripts i want to make public to the world.☆44Updated 5 years ago
- ☆15Updated 8 years ago
- A few transforms and a machine for parsing Nmap XML results☆35Updated 8 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Use Tor for anonymous scanning with nmap☆79Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆38Updated 7 years ago
- Short little AV Test to check Detection Rates☆22Updated 3 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆23Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- Small, one-off scripts for security related stuff I've written over time☆35Updated 4 years ago
- Intelligent threat hunter and phishing servers☆47Updated 5 years ago
- Plugins for the King Phisher open source phishing campaign toolkit.☆82Updated 3 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆114Updated 5 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 3 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- recon-ng Maltego local transform pack☆38Updated 10 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆84Updated 9 years ago
- scythe: account enumerator☆60Updated 11 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆63Updated 6 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 7 years ago
- Linux setup tool for Kali Linux☆78Updated 6 years ago
- ☆75Updated last year
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 9 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated last year