0xsha / sweetie-data
This repo contains logstash of various honeypots
☆174Updated 5 years ago
Alternatives and similar repositories for sweetie-data
Users that are interested in sweetie-data are comparing it to the libraries listed below
Sorting:
- A malware analysis and classification tool.☆190Updated 3 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 4 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆237Updated 2 years ago
- AI-based, context-driven network device ranking☆297Updated last year
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆114Updated 5 years ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 5 years ago
- Cross-platform Yara scanner written in Go☆329Updated 2 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- Internet data acquisition☆149Updated 4 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- a low(zero) cost threat intelligence&response tool against phishing domains☆155Updated 2 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆249Updated last month
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- Searches For Threat Hunting and Security Analytics☆241Updated last month
- Discover target social media profiles☆81Updated 2 years ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- ☆138Updated 6 years ago
- Pattern Extractor for Obfuscated Code☆298Updated 3 years ago
- A powerful target reconnaissance framework powered by graph theory.☆419Updated 2 years ago
- internet monitoring osint telegram bot for windows☆153Updated 2 years ago