CiscoCXSecurity / NeoPILinks
☆482Updated 3 years ago
Alternatives and similar repositories for NeoPI
Users that are interested in NeoPI are comparing it to the libraries listed below
Sorting:
- Shell Detector – is a application that helps you find and identify php/cgi(perl)/asp/aspx shells. Shell Detector has a “web shells” signa…☆406Updated 5 years ago
- A Simple Elasticsearch Honeypot☆188Updated 9 years ago
- Apache Logfile Security Analyzer☆213Updated 6 years ago
- Machinae Security Intelligence Collector☆526Updated last year
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆272Updated 6 years ago
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆820Updated 9 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆945Updated 4 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆547Updated 2 years ago
- ☆509Updated 4 years ago
- Honeypot deployment made easy☆236Updated 6 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368Updated last year
- A modular Python application to collect intelligence for malicious hosts.☆268Updated 4 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆482Updated 4 years ago
- ☆306Updated 8 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆432Updated 5 years ago
- Easy automated vulnerability scanning, reporting and analysis☆701Updated 5 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated last year
- Plecost - Wordpress finger printer Tool☆340Updated 2 years ago
- Malicious HTTP traffic explorer☆717Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆480Updated last month
- Snort + Barnyard2 + Pulledpork → The easy way!☆167Updated 4 years ago
- Guidance for mitigation web shells. #nsacyber☆977Updated 2 years ago
- Automatic Yara Rule Generation☆332Updated 9 years ago
- Attack Detection☆1,360Updated 2 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆654Updated last week
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Clone of svn repository of http://insecurety.net/projects/web-malware/ project☆463Updated 8 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- A low to medium interaction honeypot.☆469Updated last year
- DejaVU - Open Source Deception Framework☆411Updated 2 years ago