Your Friendly Neighbourhood Honeypot Maker and Manager
☆33Mar 20, 2019Updated 7 years ago
Alternatives and similar repositories for apate
Users that are interested in apate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- General tools and scripts i want to make public to the world.☆46Apr 14, 2019Updated 7 years ago
- Customisable PCAP parser and research assistant☆26Jan 8, 2018Updated 8 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- Short little AV Test to check Detection Rates☆20Jan 28, 2021Updated 5 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- A Python Package for Data Exfiltration☆803Jul 2, 2025Updated 9 months ago
- The Horrific Omnipotent Rootkit☆24Mar 17, 2017Updated 9 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- A simple SMTP Mass mailer program utilising open relays.☆10Aug 1, 2016Updated 9 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- A simple web gui for Transmission☆19Sep 25, 2010Updated 15 years ago
- ☆27Apr 23, 2024Updated last year
- Password list character frequency analyzer that can output hashcat masks☆16May 22, 2019Updated 6 years ago
- ☆10Oct 2, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Metasploit/MSFVenom Payload Generator Stand Alone☆32May 5, 2017Updated 8 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- Python3 tool to perform password spraying using RDP☆17Aug 14, 2023Updated 2 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆81May 20, 2022Updated 3 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- pypykatz plugin for volatility3 framework☆46May 30, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- JynxKit is an LD_PRELOAD userland rootkit for Linux systems with reverse connection SSL backdoor☆60Dec 15, 2012Updated 13 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- Man in the browser attack is all about stealing credentials from sites running in internet-explorer by forcing user to logout and then ag…☆11Feb 17, 2023Updated 3 years ago
- ☆27May 29, 2015Updated 10 years ago