ADHD Tools Usage Document ADHD Version: 4.0.0 | GitHub Page | Project Page Black Hills Information Security ADHD Credentials Artillery Example 1: Running Artillery Example 2: Triggering a Honeyport Example 3: Adding a File to a Watched Directory Bear Trap Example 1: Basic Usage BeEF Example 1: Hooking a Web Browser Example 2: Browser Based Exploitation With BeEF CanaryTokens Example 1: Creating Callbacks Using Local Canary Instance Example 2: Creating Callbacks Using CanaryTokens.org Cowrie Example 1: Running Cowrie Example 2: Cowrie In Action Example 3: Viewing Cowrie's Logs Decloak Example 1: Compiling Flash and Java Objects Example 2: Setting Up the Decloak DNS Server Example 3: Browsing to a Decloak Activated Website Example 4: Viewing the Decloak Database Example 5: Tearing Down the Decloak DNS Server DenyHosts Example 1: Installing DenyHosts Example 2: Enabling DenyHosts Example 3: Basic Configuration Gcat Example 1: Deploying an Implant Example 2: Running a Command & Retrieving Output Ghostwriting.sh Example 1: Obfuscating an executable with Ghostwriting.sh HoneyBadger Example 1: Overview Example 2: Using the Map Example 3: Working with Targets Example 4: Working with Beacons Example 5: Observing the Log Example 6: Changing Profile Information Example 7: Administration Example 8: Agents Honey Ports Example 1: Monitoring A Port With HoneyPorts Example 2: Blacklisting In Action Example 3: Spoofing TCP Connect for Denial Of Service Jar-Combiner Example 1: Finding the Entrypoints Example 2: Combining Two jars Example 3: Signing Finished.jar Example 4: Launching Your Jar Via HTML Example 5: Changing Java Security Settings Java Applet Web Attack Example 1: Cloning a URL Example 2: Weaponizing a Web Page Example 3: Starting the Attack Server Example 4: Stopping the Attack Server Example 5: Customizing the Payloads OpenCanary Example 1: Deploying OpenCanary as a Service OsChameleon Example 1: Scanning Yourself PHP-HTTP-Tarpit Example 1: Deployment Portspoof Example 1: Starting Portspoof Example 2: Spoofing Service Signatures Example 3: Cleaning Up PSAD Example 1: Installing PSAD Example 2: Iptables Configuration Example 3: Checking for Messages Example 4: Email Alerts Example 5: Updating Signatures Recon-ng Example 1: Finding Hosts With Bing Example 2: Viewing Stored Data Example 3: Reporting From Within Recon-ng Rubberglue Example 1: Setting a Trap SET Example 1: Look over SET's features Spidertrap Example 1: Basic Usage Example 2: Providing a List of Links Example 3: Trapping a Wget Spider TcpRooter Example 1: Increasing Coverage Web Bug Server Example 1: Setting up the Web Bug Doc Example 2: Viewing Bug Connections in the Database Weblabyrinth Example 1: Basic Usage Example 2: Viewing the Database with Adminer Example 3: Wget Gets Lost in the Labyrinth Wordpot Example 1: Running a fake Wordpress install