Mengmengada / ThingPotLinks
☆13Updated 8 years ago
Alternatives and similar repositories for ThingPot
Users that are interested in ThingPot are comparing it to the libraries listed below
Sorting:
- malware-traffic-analysis.net PCAPs repository.☆38Updated 9 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- ☆21Updated 10 years ago
- Maltese - Malware Traffic Emulator☆26Updated 8 years ago
- Malware/IOC ingestion and processing engine☆107Updated 7 years ago
- Extract files from network traffic with Zeek.☆103Updated 5 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆53Updated 7 years ago
- Detection of malware using dynamic behavior and Windows audit logs☆76Updated 10 years ago
- ☆52Updated 10 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Updated 10 years ago
- The stratosphere testing framework is mean to help in the researching and verification of the behavioral models used by the Stratoshpere …☆50Updated 7 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 12 years ago
- Evading Snort Intrusion Detection System.☆78Updated 4 years ago
- a collection of public yara rules☆25Updated 6 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 12 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- OpenFlow Honeypot☆24Updated 12 years ago
- ☆42Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- ☆75Updated 3 years ago
- Shared yara rules☆30Updated 11 years ago
- Honeynet Project generic authenticated datafeed protocol☆217Updated 2 years ago
- Passive DNS V2☆60Updated 11 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆25Updated 6 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆54Updated 10 years ago
- Detect cryptocurrency mining traffic with Zeek.☆46Updated 4 years ago
- Yara rules☆49Updated 11 years ago
- ☆22Updated 7 years ago