Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
-
Updated
Oct 15, 2022 - Shell
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
An ssh honeypot with the XZ backdoor. CVE-2024-3094
An HTTP and HTTPS sniffing tool created using a Raspberry Pi
Digital Forensics and Incident Response (DFIR)
Spirit - Network Pentest Tools
Deploy a honeypot and a crypto currency miner together, so sweet.
A simple low-interaction port monitoring honeypot.
KPots is a simple honeypots system to capture and log traffic to specified ports. Requires Netcat for monitoring and IPTables for banning. Requires dig for filtering out your own ip address. (Note: I will be adding alternatives in a later realease, but for now, just install dig.)
DShield Sensor Log Collection with ELK
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
Using Wordpress version 3.2 and above as honeypot to capture log
The goal of Engaged Threat is to provide honeypot researchers the ability to hold the attention of an attacker or to induce the attacker to participate in some sort of increased activity.
Cowrie Honeypot with Elasticsearch
Add a description, image, and links to the honeypot topic page so that developers can more easily learn about it.
To associate your repository with the honeypot topic, visit your repo's landing page and select "manage topics."