DinoTools / dionaea
Home of the dionaea honeypot
☆741Updated 9 months ago
Alternatives and similar repositories for dionaea:
Users that are interested in dionaea are comparing it to the libraries listed below
- Super Next generation Advanced Reactive honEypot☆462Updated 10 months ago
- Web Application Honeypot☆574Updated 9 months ago
- Advanced Honeypot framework.☆1,252Updated last year
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago
- Modern Honey Network☆2,451Updated 5 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,273Updated 3 months ago
- ☆1,072Updated 6 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,588Updated last year
- Your Everyday Threat Intelligence☆1,847Updated this week
- A low to medium interaction honeypot.☆467Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,509Updated 9 months ago
- A collection of sources of indicators of compromise.☆855Updated 7 months ago
- FAME Automates Malware Evaluation☆895Updated 3 weeks ago
- Python low-interaction honeyclient☆1,011Updated this week
- DejaVU - Open Source Deception Framework☆410Updated 2 years ago
- yarGen is a generator for YARA rules☆1,637Updated last month
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,152Updated 3 weeks ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆667Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,035Updated last week
- Malcom - Malware Communications Analyzer☆1,161Updated 7 years ago
- An SMTP Honeypot☆264Updated last month
- Indicators of Compromises (IOC) of our various investigations☆1,766Updated last week
- Indicators from Unit 42 Public Reports☆711Updated 2 weeks ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,040Updated 3 years ago
- ICS/SCADA honeypot☆1,323Updated 4 months ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,306Updated last year
- Extract and aggregate threat intelligence.☆863Updated last year
- YARA signature and IOC database for my scanners and tools☆2,608Updated this week
- Online hash checker for Virustotal and other services☆825Updated last month
- ☆710Updated 2 years ago