Plazmaz / MongoDB-HoneyProxyLinks
A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.
☆92Updated 2 years ago
Alternatives and similar repositories for MongoDB-HoneyProxy
Users that are interested in MongoDB-HoneyProxy are comparing it to the libraries listed below
Sorting:
- ☆78Updated 9 years ago
- Honeynet Project generic authenticated datafeed protocol☆215Updated last year
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- YAPDNS☆39Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆124Updated 9 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 6 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Honeypot deployment made easy☆236Updated 6 years ago
- observation camera honeypot☆50Updated 10 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Updated 7 years ago
- Malware Control Monitor☆87Updated 10 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago