Fedex100 / awesome-honeypotsLinks
☆22Updated 8 years ago
Alternatives and similar repositories for awesome-honeypots
Users that are interested in awesome-honeypots are comparing it to the libraries listed below
Sorting:
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆34Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆46Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆56Updated 2 years ago
- URL fingerprinting made easy☆89Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆56Updated last year
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated last year
- Sniffing out well-known threat groups☆55Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- ☆24Updated 2 years ago
- ☆21Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- This script is to build Wazuh 4.3 environment☆11Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆61Updated 5 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆56Updated 4 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆131Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆51Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 8 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆95Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆51Updated last week
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 2 weeks ago