PHP Script demonstrating a smart honey pot. Gettings Started Download the latest release. Choose one of the forms: simple-form.php, hardened-form.php or bootstrap-form.php (simple-form.php is intended as a simple way to understand the script only. It is not intended for use in production.) Set the contants Set the $salt. I recommend http://www.sethcardoza.com/tools/random-password-generator/ as a quick tool to get some random stuff to put in there. Set $recipients to a comma-separated list of emails (as accepted by PHP mail function) Set $senderName. This will be included in the from address of the email. Set $sender. This is the email address where the form originates. Typically something like noreply@example.com. Set $subject. This is the email subject. Modify the form to include the fields you need. action defaults to the current script address method should remain set at post. Changing this will cause the form not to send emails. fields is an array of inputs (and form elements) that you would like in your form. You can use the following form elements: text, url, email, number, phone/tel, checkbox, file, textarea, select, and submit The last form input should always
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Extract local data storage of an Android application in one click.
Hashcat is a fast and advanced password recovery utility that supports various attack modes and hashing algorithms, and is open-source and community-driven.
A command line steganography tool that uses LSB technique to hide files within images without visible alteration.
A tool for extracting static and dynamic features from Android APKs.
Comprehensive manual for mobile app security testing and reverse engineering with technical processes for verifying controls.
A search engine for the Internet of Things (IoT) that discovers and monitors devices connected to the internet.
An industrial control system testing tool that enables security researchers to enumerate SCADA controllers, read register values, and modify register data across different testing modes.
A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.
Phish Report is inaccessible without JavaScript and cookies enabled.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.