HoneypyA low to medium interaction honeypot.
Stars: ✭ 410 (-25.05%)
FfmFreedom Fighting Mode: open source hacking harness
Stars: ✭ 302 (-44.79%)
rdppotRDP honeypot
Stars: ✭ 55 (-89.95%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-15.36%)
WirespyFramework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Stars: ✭ 293 (-46.44%)
singlefilefeatured cs:go internal hack, one file and less than 1000 lines.
Stars: ✭ 47 (-91.41%)
InfosecУчебное пособие по защите информации кафедры радиотехники и систем управления МФТИ
Stars: ✭ 386 (-29.43%)
anubisCaptive wifi hotspot bypass tool for Linux
Stars: ✭ 46 (-91.59%)
Hackermind渗透步骤,web安全,CTF,业务安全,人工智能,区块链安全,安全开发,无线安全,社会工程学,二进制安全,移动安全,红蓝对抗,运维安全,风控安全,linux安全
Stars: ✭ 284 (-48.08%)
HellPotHellPot is a portal to endless suffering meant to punish unruly HTTP bots.
Stars: ✭ 146 (-73.31%)
DionaeaHome of the dionaea honeypot
Stars: ✭ 490 (-10.42%)
HosTaGeLow Interaction Mobile Honeypot
Stars: ✭ 58 (-89.4%)
NovahotA webshell framework for penetration testers.
Stars: ✭ 284 (-48.08%)
DecoyMini🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Stars: ✭ 213 (-61.06%)
WebdevelopersecuritychecklistA checklist of important security issues you should consider when creating a web application.
Stars: ✭ 379 (-30.71%)
honeybits-winWindows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!
Stars: ✭ 20 (-96.34%)
Cve 2019 1003000 Jenkins Rce PocJenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Stars: ✭ 270 (-50.64%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (-94.15%)
Honeylambdahoneyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top of AWS Lambda and Amazon API Gateway
Stars: ✭ 454 (-17%)
CC33ZCurso de Ciência da Computação
Stars: ✭ 50 (-90.86%)
DejavuDejaVU - Open Source Deception Framework
Stars: ✭ 265 (-51.55%)
XessMy minimal Gruvbox CSS file I've been keeping multiple places
Stars: ✭ 144 (-73.67%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+660.88%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (-22.49%)
Gmail-HackGmail account using brute force attack
Stars: ✭ 69 (-87.39%)
mhn🍯 Analyze and Visualize Data from Modern Honey Network Servers with R
Stars: ✭ 16 (-97.07%)
OpcdeOPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (-1.65%)
masscannedLet's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
Stars: ✭ 50 (-90.86%)
BruteSploitBruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and maybe can be used in CTF for manipulation,combine,transform and permutation some words or file text :p
Stars: ✭ 26 (-95.25%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-94.33%)
CowrieCowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Stars: ✭ 3,810 (+596.53%)
CyberPunkNetrunnerCyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Stars: ✭ 69 (-87.39%)
BurningDogsHoneypot log processor to create OTX Pulse entries
Stars: ✭ 31 (-94.33%)
netizenshipa commandline #OSINT tool to find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc.
Stars: ✭ 33 (-93.97%)
Wahh extrasThe Web Application Hacker's Handbook - Extra Content
Stars: ✭ 428 (-21.76%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-87.02%)
owtUpdate Version 3.1 added free SMS messaging.
Stars: ✭ 339 (-38.03%)
foss-eventsA simple website with a collection of open-source events happening across the globe. This is a beginner-friendly repository that helps you learn git and contribute to web projects. Happy Hacktober!
Stars: ✭ 123 (-77.51%)
JugglerA system that may trick hackers. 一个也许能骗到黑客的系统。
Stars: ✭ 321 (-41.32%)
TJCS-Assignment🚀 同济大学计算机科学与技术、信息安全专业作业链接仓库。含部分科目的习题、大作业仓库链接。期待各位的贡献与支持......
Stars: ✭ 59 (-89.21%)
weblogic honeypotWebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-94.52%)
GitpreySearching sensitive files and contents in GitHub associated to company name or other key words
Stars: ✭ 478 (-12.61%)
Awesome-DeceptionAn awesome list of resources on deception-based security with honeypots and honeytokens
Stars: ✭ 61 (-88.85%)
ZKShSSearch shodan without any knowledge about its queries
Stars: ✭ 37 (-93.24%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-42.41%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-94.52%)
My LinksKnowledge seeks no man
Stars: ✭ 311 (-43.14%)
Loki一个轻量级Web蜜罐 - A Little Web Honeypot.🍯🍯🍯🐝🐝🐝
Stars: ✭ 151 (-72.39%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-24.5%)
WebTrapThis project is designed to create deceptive webpages to deceive and redirect attackers away from real websites.
Stars: ✭ 45 (-91.77%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-96.16%)
No More SecretsA command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
Stars: ✭ 5,042 (+821.76%)
InstainsaneMulti-threaded Instagram Brute Forcer (100 attemps at once)
Stars: ✭ 475 (-13.16%)
My Infosec AwesomeMy curated list of awesome links, resources and tools on infosec related topics
Stars: ✭ 412 (-24.68%)