CanadianJeff / honeywrt
☆21Updated 9 years ago
Alternatives and similar repositories for honeywrt:
Users that are interested in honeywrt are comparing it to the libraries listed below
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆38Updated 10 years ago
- Modular tool to test exfiltration techniques.☆36Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- See here:☆42Updated 12 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- AYY LMAO☆21Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Updated 4 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 8 years ago
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Find Unicode (including Internationalized) domain squats. https://xntwist.hightower.space/☆22Updated 2 years ago
- NTP logger/honeypot☆52Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 3 months ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- ☆24Updated 8 years ago
- A warehouse for your malware☆134Updated 11 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk☆23Updated 6 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 3 years ago