amv42 / sshd-honeypot
☆26Updated 6 years ago
Alternatives and similar repositories for sshd-honeypot:
Users that are interested in sshd-honeypot are comparing it to the libraries listed below
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- Yara Dockerfile☆50Updated 2 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 6 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆30Updated 6 years ago
- SSH Multipot☆22Updated 6 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- AYY LMAO☆21Updated 8 years ago
- DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool i…☆21Updated 3 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆42Updated 7 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆23Updated 7 years ago
- Suricata rules to detect Winnti communication☆14Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Zone transfers for rwhois☆20Updated 6 years ago
- ☆14Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Spam trap management☆23Updated 9 months ago