Plazmaz / MongoDB-HoneyProxyLinks
A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.
β92Updated 2 years ago
Alternatives and similar repositories for MongoDB-HoneyProxy
Users that are interested in MongoDB-HoneyProxy are comparing it to the libraries listed below
Sorting:
- analyze a web-based network traffic πΆ to detect central command and control serversβ80Updated 7 years ago
- β78Updated 10 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) Fileβ160Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypotsβ62Updated 9 years ago
- A simple and effective phpmyadmin honeypotβ67Updated 7 years ago
- Normalizer for honeypot data.β45Updated 10 years ago
- a low-interaction honeypotβ94Updated 8 years ago
- Monitoring 'DNS' inside the Tor networkβ92Updated 8 years ago
- AMIRA: Automated Malware Incident Response & Analysisβ151Updated 6 months ago
- The Seeker of IOCβ129Updated 4 years ago
- Collection of tools for web recon and enumeration.β56Updated 10 years ago
- Exfiltrate files via DNSβ95Updated 11 years ago
- Leak File Analyzerβ62Updated 7 years ago
- Malware Classifier From Network Capturesβ82Updated 8 years ago
- A warehouse for your malwareβ133Updated 12 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.ioβ41Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devicesβ65Updated 9 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.β7Updated 6 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)β159Updated 3 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence Systemβ125Updated 9 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sourcesβ100Updated 7 years ago
- β19Updated 4 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...β72Updated 6 years ago
- NTP logger/honeypotβ54Updated 11 years ago
- Transforms for the AlienVault OTX serviceβ39Updated 8 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpoβ¦β88Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externallyβ58Updated 10 years ago
- Transform NMap Scans to an D3.js HTML Tableβ59Updated 7 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.β38Updated 14 years ago
- BTG's purpose is to make fast and efficient search on IOCβ70Updated 6 years ago