YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques
☆68Jun 18, 2019Updated 6 years ago
Alternatives and similar repositories for yalih
Users that are interested in yalih are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆29May 4, 2016Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- File Scanning Framework☆295Sep 15, 2021Updated 4 years ago
- Python low-interaction honeyclient☆1,021Mar 22, 2026Updated last week
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,117Feb 14, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- CrowdStrike Feed Management System. CrowdFMS is a framework for automating collection and processing of samples from VirusTotal, by lever…☆133Nov 13, 2018Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Honeypot Intelligence with Splunk☆255Oct 18, 2018Updated 7 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cowrie Honeypot Obscurer☆18Oct 14, 2020Updated 5 years ago
- C version of the MetroHash function☆27Jun 8, 2015Updated 10 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago