CiscoCXSecurity / NeoPI
☆477Updated 3 years ago
Alternatives and similar repositories for NeoPI:
Users that are interested in NeoPI are comparing it to the libraries listed below
- Shell Detector – is a application that helps you find and identify php/cgi(perl)/asp/aspx shells. Shell Detector has a “web shells” signa…☆404Updated 5 years ago
- Apache Logfile Security Analyzer☆211Updated 6 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆940Updated 3 years ago
- Suricata, Snort and Zeek IDS rule and pcap testing system☆471Updated last month
- ☆507Updated 4 years ago
- Web Shell Detector – is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells…☆816Updated 9 years ago
- ☆308Updated 7 years ago
- A Simple Elasticsearch Honeypot☆187Updated 9 years ago
- Machinae Security Intelligence Collector☆508Updated 9 months ago
- Malicious HTTP traffic explorer☆716Updated last year
- Framework for Testing WAFs (FTW!)☆265Updated last year
- Scirius is a web application for Suricata ruleset management and threat hunting.☆644Updated 2 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆542Updated last year
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆273Updated 5 years ago
- Plecost - Wordpress finger printer Tool☆339Updated 2 years ago
- Easy automated vulnerability scanning, reporting and analysis☆702Updated 5 years ago
- Honeypot deployment made easy☆235Updated 5 years ago
- 16,432 Free Yara rules created by☆382Updated 5 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆199Updated 3 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated last year
- Analysis of DNS records to find popular trends☆446Updated 8 years ago
- A modular Python application to collect intelligence for malicious hosts.☆264Updated 3 years ago
- A low to medium interaction honeypot.☆465Updated 11 months ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆478Updated 3 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Updated 7 years ago
- Version 2 of the ThreatCrowd API☆269Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Attack Detection☆1,349Updated 2 years ago
- Clone of svn repository of http://insecurety.net/projects/web-malware/ project☆462Updated 8 years ago
- Create a TCP circuit through validly formed HTTP requests☆345Updated 7 years ago