A honeypot that can be used to observe traffic directed at wireless home routers. The honeypot will emulate a Belkin N300 Home Wireless router with the default setup. These routers are shipped with no password set for the administrative interface by default. Usage: $ cd WAPot $ go run main.go The idea is to expose this interface externally on port 8080 or 8000 to appear as if an administrative port has been opened to the internet.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Ericsson Enterprise Wireless Solutions provides secure wireless connectivity for businesses through private 5G networks, enterprise coverage solutions, and cloud-managed WWAN infrastructure with integrated zero trust security.
A bash script for scanning a target network for HTTP resources through XXE
Normalize, index, enrich, and visualize network capture data using Potiron.
An automated DDoS vulnerability testing platform that continuously evaluates DDoS protection systems without causing operational downtime.
A free DNS recursive service that blocks malicious host names and protects user privacy.
A technique to associate applications with TLS parameters for identifying malware and vulnerable applications.
Suricata offers real-time intrusion detection, intrusion prevention, and network monitoring.
AWS Shield provides managed DDoS protection for your applications, automatically detecting and mitigating sophisticated network-level DDoS events.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.