Distributed Honeypot
☆63Apr 29, 2018Updated 7 years ago
Alternatives and similar repositories for DemonHunter
Users that are interested in DemonHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script for turning a Raspberry Pi into a Honey Pot Pi☆35Sep 25, 2024Updated last year
- damn simple honey pot☆19May 31, 2016Updated 9 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- bap - http Basic Authentication honeyPot☆54Jan 15, 2015Updated 11 years ago
- Bash and Python Honeyport scripts☆47Feb 22, 2017Updated 9 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- This project is designed to create deceptive webpages to deceive and redirect attackers away from real websites.☆68Mar 28, 2018Updated 7 years ago
- Instant messenger honeypot☆16Mar 22, 2016Updated 10 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- A python web application compliment to py80211 which allows you to visualize the airwaves around you with your web browser.☆16Jun 19, 2014Updated 11 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contain…☆15Nov 11, 2019Updated 6 years ago
- Base service class from Assemblyline 4☆15Updated this week
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Samsung Galaxy S7 Edge Rooting Guide (and probably some kernel stuff, too)☆19Jul 14, 2016Updated 9 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- suricata rules☆18Dec 26, 2024Updated last year
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- A low to medium interaction honeypot.☆472Mar 21, 2024Updated 2 years ago
- Pulsar Registry Frontend for Community Packages☆13Feb 15, 2026Updated last month
- Docker based honeypot (Dionaea & Kippo)☆26Mar 21, 2015Updated 11 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 9 months ago
- A Splunk app that will rotate between dashboards on a frequency; useful for displaying content on informational big screens.☆13Mar 9, 2022Updated 4 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16May 27, 2019Updated 6 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- A framework for receiving and redistributing abuse feeds☆125Sep 27, 2019Updated 6 years ago