JustinAzoff / ssh-auth-loggerLinks
A low/zero interaction ssh authentication logging honeypot
☆25Updated 2 months ago
Alternatives and similar repositories for ssh-auth-logger
Users that are interested in ssh-auth-logger are comparing it to the libraries listed below
Sorting:
- D4 core software (server and sample sensor client)☆42Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- IMAP or SMTP honeypot written in Golang☆26Updated 3 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Useful commands for infosec☆29Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 6 months ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- server for indexing and querying passive DNS observations☆49Updated last month
- ☆49Updated 10 years ago
- SMTP honeypot written in Golang☆32Updated 9 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆111Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 2 months ago
- Provide a shell like interface by utilizing osquery's distributed API☆81Updated 5 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- MISP - Ansible installation script☆22Updated 6 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- SSH Multipot☆24Updated 7 years ago