Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
-
Updated
Oct 15, 2022 - Shell
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
An ssh honeypot with the XZ backdoor. CVE-2024-3094
Digital Forensics and Incident Response (DFIR)
An HTTP and HTTPS sniffing tool created using a Raspberry Pi
Spirit - Network Pentest Tools
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Cowrie Honeypot with Elasticsearch
A simple low-interaction port monitoring honeypot.
Deploy a honeypot and a crypto currency miner together, so sweet.
DShield Sensor Log Collection with ELK
The goal of Engaged Threat is to provide honeypot researchers the ability to hold the attention of an attacker or to induce the attacker to participate in some sort of increased activity.
Honeypot with a twist of Red Teaming!
KPots is a simple honeypots system to capture and log traffic to specified ports. Requires Netcat for monitoring and IPTables for banning. Requires dig for filtering out your own ip address. (Note: I will be adding alternatives in a later realease, but for now, just install dig.)
Add a description, image, and links to the honeypot topic page so that developers can more easily learn about it.
To associate your repository with the honeypot topic, visit your repo's landing page and select "manage topics."