0xsha / sweetie-dataLinks
This repo contains logstash of various honeypots
☆174Updated 5 years ago
Alternatives and similar repositories for sweetie-data
Users that are interested in sweetie-data are comparing it to the libraries listed below
Sorting:
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- A malware analysis and classification tool.☆190Updated 3 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆156Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- AI-based, context-driven network device ranking☆296Updated last year
- A script that automates generation of OpenSSL reverse shells☆301Updated 4 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Internet data acquisition☆149Updated 4 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆251Updated 3 weeks ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- ☆137Updated 6 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Pattern Extractor for Obfuscated Code☆299Updated 3 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Searches For Threat Hunting and Security Analytics☆241Updated 3 months ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆90Updated last year
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆115Updated 5 years ago
- Automated Tactics Techniques & Procedures☆255Updated 2 years ago
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago