CiscoCXSecurity / NeoPILinks
☆481Updated 3 years ago
Alternatives and similar repositories for NeoPI
Users that are interested in NeoPI are comparing it to the libraries listed below
Sorting:
- Shell Detector – is a application that helps you find and identify php/cgi(perl)/asp/aspx shells. Shell Detector has a “web shells” signa…☆406Updated 5 years ago
- Easy automated vulnerability scanning, reporting and analysis☆702Updated 5 years ago
- Apache Logfile Security Analyzer☆213Updated 6 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆943Updated 4 years ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆651Updated 3 weeks ago
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆819Updated 9 years ago
- Framework for Testing WAFs (FTW!)☆266Updated 2 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆478Updated 2 weeks ago
- Machinae Security Intelligence Collector☆525Updated last year
- ☆306Updated 8 years ago
- A Simple Elasticsearch Honeypot☆187Updated 9 years ago
- Attack Detection☆1,358Updated 2 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆201Updated 3 years ago
- OSSEC Web User Interface - Unmaintained!!☆163Updated 3 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆660Updated 6 years ago
- Suspicious DGA from PDNS and Sandbox.☆185Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆545Updated 2 years ago
- Honeypot deployment made easy☆236Updated 6 years ago
- The pattern matching swiss knife☆138Updated 5 years ago
- Version 2 of the ThreatCrowd API☆271Updated 2 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆465Updated 6 years ago
- The Web Application Vulnerability Scanner Evaluation Project☆233Updated 2 years ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆812Updated 7 years ago
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆359Updated last year
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 3 years ago
- A low to medium interaction honeypot.☆468Updated last year
- A high interaction SSH honeypot☆125Updated 2 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- Scan systems with NMap and parse the output to a list of CVE's, CWE's and DPE's☆277Updated 5 years ago