HASH (HTTP Agnostic Software Honeypot)
☆141Mar 16, 2026Updated this week
Alternatives and similar repositories for HASH
Users that are interested in HASH are comparing it to the libraries listed below
Sorting:
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Mar 2, 2026Updated 2 weeks ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 2 months ago
- Tool for obfuscating and deobfuscating data.☆77Mar 20, 2024Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Turn any blog into structured threat intelligence.☆54Updated this week
- ☆40Nov 29, 2024Updated last year
- Sandbox samples and monitor them with kunai☆29Mar 3, 2026Updated 2 weeks ago
- ☆56Dec 13, 2025Updated 3 months ago
- ☆86Feb 4, 2026Updated last month
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 3 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 6 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Mar 11, 2026Updated last week
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated 2 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 6 months ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated last year
- ☆55Apr 25, 2023Updated 2 years ago
- A Software as a Service (SaaS) log collection framework.☆184Updated this week
- ☆14Jan 8, 2026Updated 2 months ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated last month
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- An open source platform to support analysts to organise their case and tasks☆128Updated this week
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Nuclei templates for honeypots detection.☆197Nov 7, 2023Updated 2 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated last year
- Fun tools around the EBS Direct API☆19Apr 16, 2021Updated 4 years ago