Cymmetria / honeycombView external linksLinks
An extensible honeypot framework
☆95Jul 15, 2022Updated 3 years ago
Alternatives and similar repositories for honeycomb
Users that are interested in honeycomb are comparing it to the libraries listed below
Sorting:
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Oct 19, 2023Updated 2 years ago
- MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality …☆17Sep 25, 2018Updated 7 years ago
- WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middlew…☆33Apr 25, 2020Updated 5 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 4 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Open Source Telnet Honeypot☆106Mar 20, 2017Updated 8 years ago
- Community-based integrated malware identification system☆81Dec 10, 2022Updated 3 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- ☆23Oct 9, 2024Updated last year
- ☆34Apr 29, 2021Updated 4 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆13Jan 20, 2017Updated 9 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- IDA recompiler☆31Dec 8, 2014Updated 11 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- GasPot Released at Blackhat 2015☆145Apr 30, 2024Updated last year
- ☆29Nov 10, 2016Updated 9 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 4 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- iOS 12.0 -> 12.1.2 _kernproc and _rootvnode offsets for 16K devices☆11Feb 15, 2019Updated 7 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago