CiscoCXSecurity / NeoPILinks
☆482Updated last month
Alternatives and similar repositories for NeoPI
Users that are interested in NeoPI are comparing it to the libraries listed below
Sorting:
- Shell Detector – is a application that helps you find and identify php/cgi(perl)/asp/aspx shells. Shell Detector has a “web shells” signa…☆409Updated 6 years ago
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆821Updated 10 years ago
- ☆307Updated 8 years ago
- Apache Logfile Security Analyzer☆214Updated 6 years ago
- A Simple Elasticsearch Honeypot☆189Updated 10 years ago
- Plecost - Wordpress finger printer Tool☆347Updated 2 years ago
- Suspicious DGA from PDNS and Sandbox.☆187Updated 3 years ago
- Machinae Security Intelligence Collector☆537Updated last year
- Web Application Honeypot☆593Updated last year
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆945Updated 4 years ago
- ☆519Updated 4 years ago
- The pattern matching swiss knife☆140Updated 5 years ago
- Attack Detection☆1,360Updated 3 years ago
- WebShell Collect☆395Updated 9 years ago
- The Magical Code Injection Rainbow! MCIR is a framework for building configurable vulnerability testbeds. MCIR is also a collection of co…☆446Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆552Updated 2 years ago
- A high interaction SSH honeypot☆124Updated 2 years ago
- PA Toolkit is a collection of traffic analysis plugins focused on security☆435Updated 6 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆510Updated 3 weeks ago
- RIPS - A static source code analyser for vulnerabilities in PHP scripts☆359Updated 9 years ago
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 5 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Updated 7 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Updated 6 years ago
- Version 2 of the ThreatCrowd API☆273Updated 2 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆369Updated last year
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆283Updated 5 months ago
- ☆176Updated 4 years ago
- Snort + Barnyard2 + Pulledpork → The easy way!☆169Updated 4 years ago
- Passive DNS collection using Zeek☆181Updated 2 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆204Updated 3 years ago