Plazmaz / MongoDB-HoneyProxyLinks
A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.
☆92Updated 2 years ago
Alternatives and similar repositories for MongoDB-HoneyProxy
Users that are interested in MongoDB-HoneyProxy are comparing it to the libraries listed below
Sorting:
- A Network Inspection Tool☆82Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 9 years ago
- A simple and effective phpmyadmin honeypot☆67Updated 7 years ago
- ☆78Updated 10 years ago
- The Seeker of IOC☆129Updated 5 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- NTP logger/honeypot☆54Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 4 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- YAPDNS☆39Updated 10 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆138Updated 6 months ago
- a low-interaction honeypot☆94Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆62Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- ☆19Updated 4 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- A warehouse for your malware☆133Updated 12 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Honeynet Project generic authenticated datafeed protocol☆216Updated last year
- Analyse SQL injection attempts in web server logs☆82Updated 8 years ago