CanadianJeff / honeywrtLinks
☆24Updated 10 years ago
Alternatives and similar repositories for honeywrt
Users that are interested in honeywrt are comparing it to the libraries listed below
Sorting:
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Malware/IOC ingestion and processing engine☆107Updated 7 years ago
- NTP logger/honeypot☆54Updated 11 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 10 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Simple UDP honeypot script☆50Updated 2 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated 11 months ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Just random files I've stored here for people to get access to because wordpress doesn't like python.☆83Updated 3 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Malware samples from honeypots☆71Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆139Updated 8 months ago
- Low-Impact Fingerprint Tool☆59Updated 2 months ago
- Python Malware Crawler for Zoos and Repositories☆108Updated 7 years ago
- observation camera honeypot☆51Updated 10 years ago
- Python script to hunt phishing kits☆139Updated 2 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Cyber Intel Management☆49Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- Telnet Honeypot☆162Updated 6 years ago