☆103Feb 21, 2026Updated 2 weeks ago
Alternatives and similar repositories for Honeypot-Project
Users that are interested in Honeypot-Project are comparing it to the libraries listed below
Sorting:
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- ☆29Aug 15, 2021Updated 4 years ago
- ☆25Mar 13, 2021Updated 4 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 4 years ago
- git for the owasp books project; setting up processes capabilities for publishing OWASP books☆19Aug 17, 2018Updated 7 years ago
- This is not the cyber you ever expected....did I just say cyyyberrrr....☆15Jul 7, 2019Updated 6 years ago
- A place for storing ideas.☆15Jan 22, 2016Updated 10 years ago
- Open-source Circle of 6 with improved security and privacy features. PLEASE NOTE: For the new Circulo app please visit: https://gitlab.co…☆28May 9, 2019Updated 6 years ago
- OASIS OpenC2 TC: Repository for submitting and reviewing OpenC2 use cases relevant to the work of the OpenC2 Language Subcommittee (LSC)☆30Apr 20, 2022Updated 3 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - Zeek Extreme Performance Tuning☆26Oct 10, 2019Updated 6 years ago
- cloud.gov security policies and procedures☆27May 28, 2025Updated 9 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆68Apr 1, 2024Updated last year
- OrangeAssassin☆60Jul 25, 2023Updated 2 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- OCSP Responder monitor☆37Aug 5, 2024Updated last year
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Jun 1, 2018Updated 7 years ago
- OWASP Honeypot, Automated Deception Framework.☆477Sep 15, 2024Updated last year
- wallhack for cs:go game☆11Jul 7, 2024Updated last year
- Oak National Academy's AI Auto Eval tools provide LLM as a judge evaluation on lesson plans and resources☆17Nov 4, 2025Updated 4 months ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆303Oct 6, 2023Updated 2 years ago
- ☆34May 4, 2020Updated 5 years ago
- Getting a handle on container security☆677Dec 4, 2023Updated 2 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- A template repository for governed pipelines.☆11Jan 15, 2026Updated last month
- The following repo show basic integration and use of Youtube analytics APIs with OAuth.☆10Dec 30, 2022Updated 3 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Tool for sentiment analysis annotation☆13Mar 26, 2025Updated 11 months ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- Chatbox for Brainster☆10Aug 1, 2020Updated 5 years ago
- Secvisogram is a web tool for creating and editing security advisories in the CSAF 2.0 format☆41Updated this week
- Allowlist data for Web3Checks☆12Feb 23, 2026Updated last week
- OWASP Foundation Web Respository☆43Updated this week
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- This repo is no longer in use. Please refer to https://github.com/OWASP/www-project-vulnerable-web-applications-directory☆884Updated this week
- Acra-based example projects: check how easy it is to deploy data security in typical web infrastructures.☆34Apr 3, 2025Updated 11 months ago