Mengmengada / ThingPotLinks
☆12Updated 7 years ago
Alternatives and similar repositories for ThingPot
Users that are interested in ThingPot are comparing it to the libraries listed below
Sorting:
- ☆21Updated 9 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Updated 9 years ago
- malware-traffic-analysis.net PCAPs repository.☆36Updated 8 years ago
- The IoT honeypot (Master's Thesis)☆8Updated 5 years ago
- A system to record malware using PANDA☆44Updated 6 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- ☆42Updated 2 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆25Updated 6 years ago
- a collection of public yara rules☆26Updated 5 years ago
- A fuzzing script for MitmProxy☆22Updated 10 years ago
- ☆52Updated 10 years ago
- Maltese - Malware Traffic Emulator☆26Updated 8 years ago
- Process HTTP Pcaps With YARA☆103Updated 11 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆51Updated 9 years ago
- Data sets and examples for Jask Labs Blackhat 2017 Handout: Top 10 Machine Learning Cyber Security Use Cases☆30Updated 7 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 11 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Snort rules☆35Updated 6 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆40Updated 2 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- DockerFiles for Docker Containers☆16Updated 7 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Yet Another YARA rule Generator☆63Updated 6 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- ☆11Updated 8 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Yara rules☆48Updated 11 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago