CiscoCXSecurity / NeoPI
☆481Updated 3 years ago
Alternatives and similar repositories for NeoPI
Users that are interested in NeoPI are comparing it to the libraries listed below
Sorting:
- Shell Detector – is a application that helps you find and identify php/cgi(perl)/asp/aspx shells. Shell Detector has a “web shells” signa…☆405Updated 5 years ago
- Apache Logfile Security Analyzer☆211Updated 6 years ago
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆821Updated 9 years ago
- Machinae Security Intelligence Collector☆512Updated last year
- Easy automated vulnerability scanning, reporting and analysis☆701Updated 5 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆649Updated last month
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆943Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆477Updated 4 months ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆271Updated 6 years ago
- Honeypot deployment made easy☆236Updated 6 years ago
- Suspicious DGA from PDNS and Sandbox.☆184Updated 2 years ago
- The pattern matching swiss knife☆138Updated 5 years ago
- A Simple Elasticsearch Honeypot☆186Updated 9 years ago
- WebShell Collect☆391Updated 8 years ago
- ☆306Updated 7 years ago
- ☆507Updated 4 years ago
- Snort + Barnyard2 + Pulledpork → The easy way!☆167Updated 4 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆480Updated 4 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆201Updated 3 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Create a TCP circuit through validly formed HTTP requests☆345Updated 8 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Malicious HTTP traffic explorer☆715Updated 2 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Framework for Testing WAFs (FTW!)☆266Updated last year
- Cuckoo Sandbox Dockerfile☆327Updated 5 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- The Shadow Daemon web application firewall server☆300Updated 2 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆434Updated 5 years ago