GreyNoise-Intelligence / 2024-09-noise-storms
Notes and receipts (PCAPs) for TCP and ICMP Noise Storms
☆50Updated last month
Related projects ⓘ
Alternatives and complementary repositories for 2024-09-noise-storms
- Signature based honeypot detector tool written in Golang☆84Updated 5 months ago
- ☆67Updated last month
- NTP Exfiltration Tool☆136Updated 11 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated 3 weeks ago
- Daily updates from leaked data search engines and aggregators☆85Updated this week
- Analyze pcaps with Zeek and a Grafana Dashboard☆161Updated 5 months ago
- USB Scanning device☆20Updated 4 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆142Updated 2 months ago
- A ruleset to find potentially malicious code in macOS malware samples☆39Updated last year
- Canary Detection☆160Updated 7 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- quicmap is a simple yet quic (!) QUIC protocol scanner☆80Updated 8 months ago
- Still point in moving world.☆50Updated 2 years ago
- A command-line utility that scans for Wi-Fi networks using the 802.11 netlink API.☆28Updated last month
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- ☆66Updated 2 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆57Updated 3 months ago
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆129Updated this week
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆97Updated 8 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆82Updated this week
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Cyber Underground General Intelligence Requirements☆90Updated 9 months ago
- Automation tool for Windows Deception Host Burn-In☆76Updated 4 months ago
- Sample programs to access the API☆60Updated this week
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- ☆82Updated 2 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆98Updated last month
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 9 months ago
- Repository of tools and resources for analyzing Docker containers☆59Updated 11 months ago
- God Mode Detection Rules☆130Updated 3 months ago