0xsha / sweetie-dataLinks
This repo contains logstash of various honeypots
☆174Updated 5 years ago
Alternatives and similar repositories for sweetie-data
Users that are interested in sweetie-data are comparing it to the libraries listed below
Sorting:
- AI-based, context-driven network device ranking☆302Updated 2 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆118Updated 6 years ago
- ☆138Updated 6 years ago
- A malware analysis and classification tool.☆190Updated 4 years ago
- Code + documentation for the public GreyNoise API☆315Updated 4 years ago
- Python automation of Docker.sock abuse☆211Updated 3 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 3 years ago
- Automated Tactics Techniques & Procedures☆260Updated 2 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Updated 3 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆260Updated 4 years ago
- A medium interaction printer honeypot 🍯☆203Updated 2 years ago
- A network packet forensics tool for SSH☆254Updated 4 years ago
- Endpoint detection & Malware analysis software☆229Updated 6 years ago
- Real Time Threat Monitoring Tool☆114Updated 3 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆128Updated 5 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Updated 6 years ago
- A script that automates generation of OpenSSL reverse shells☆303Updated 5 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆51Updated 2 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- Elasticsearch for Offensive Security☆139Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆400Updated 6 years ago
- Internet data acquisition☆152Updated 5 years ago
- Open Source Threat Intelligence Chat Bot☆322Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 6 years ago
- Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment☆149Updated 3 years ago
- penetration testing scripts☆136Updated 6 years ago