amv42 / sshd-honeypotLinks
☆27Updated 6 years ago
Alternatives and similar repositories for sshd-honeypot
Users that are interested in sshd-honeypot are comparing it to the libraries listed below
Sorting:
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Yara Dockerfile☆50Updated 3 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Updated 8 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Low-interaction Postgres Honeypot☆20Updated last year
- NMap XML decoding for logstash☆28Updated 3 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- SSH Multipot☆24Updated 7 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆32Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- A simple command-line script to interact with the virustotal-api☆62Updated 7 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 9 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- ☆22Updated 7 years ago
- Suricata rules to detect Winnti communication☆16Updated 7 years ago
- ☆25Updated 4 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Updated 4 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆32Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago