GreyNoise-Intelligence / 2024-09-noise-stormsLinks
Notes and receipts (PCAPs) for TCP and ICMP Noise Storms
☆49Updated 10 months ago
Alternatives and similar repositories for 2024-09-noise-storms
Users that are interested in 2024-09-noise-storms are comparing it to the libraries listed below
Sorting:
- Signature based honeypot detector tool written in Golang☆99Updated 4 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆180Updated last year
- NTP Exfiltration Tool☆142Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 6 months ago
- ☆146Updated 2 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆99Updated 7 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- JA4TScan is an active TCP server fingerprinting tool.☆85Updated 11 months ago
- Sample programs to access the API☆89Updated 3 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆173Updated 5 months ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆150Updated last week
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆58Updated last year
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- ☆74Updated last week
- Deep Linux runtime visibility meets Wireshark☆292Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- God Mode Detection Rules☆134Updated 11 months ago
- Modular web-application honeypot platform built using go and gin☆58Updated last year
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆32Updated last month
- Knowledge base on cybercriminal concealment techniques☆75Updated 2 months ago
- OS image for the PiRogue based on Debian 12☆158Updated last year
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆224Updated 3 weeks ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆78Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆144Updated this week
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆83Updated last month
- AIL project training materials☆34Updated 2 weeks ago
- Canary Detection☆187Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2025☆34Updated 6 months ago
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆58Updated last week