DinoTools / dionaeaLinks
Home of the dionaea honeypot
☆777Updated last year
Alternatives and similar repositories for dionaea
Users that are interested in dionaea are comparing it to the libraries listed below
Sorting:
- Web Application Honeypot☆588Updated last year
- Super Next generation Advanced Reactive honEypot☆471Updated last year
- Modern Honey Network☆2,467Updated 11 months ago
- Python low-interaction honeyclient☆1,018Updated last week
- A low to medium interaction honeypot.☆472Updated last year
- Credentials catching honeypot☆384Updated last year
- Advanced Honeypot framework.☆1,283Updated 2 years ago
- FAME Automates Malware Evaluation☆916Updated 2 weeks ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,028Updated 3 years ago
- virtual honeypots☆385Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,299Updated 9 months ago
- Malcom - Malware Communications Analyzer☆1,163Updated 7 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆674Updated 2 years ago
- ICS/SCADA honeypot☆1,401Updated 10 months ago
- Your Everyday Threat Intelligence☆1,925Updated last week
- Suricata, Snort and Zeek IDS rule and pcap testing system☆502Updated last month
- Scirius is a web application for Suricata ruleset management and threat hunting.☆667Updated 2 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,872Updated 3 weeks ago
- ☆1,089Updated 6 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,094Updated this week
- DejaVU - Open Source Deception Framework☆420Updated 3 months ago
- An information security preparedness tool to do adversarial simulation.☆1,138Updated 6 years ago
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,200Updated 3 months ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆944Updated 4 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Updated 4 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,047Updated 4 years ago
- He who flays the hide☆229Updated last year
- Malware Configuration And Payload Extraction☆758Updated 11 months ago
- Guidance for mitigation web shells. #nsacyber☆983Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆815Updated 5 years ago