Honeypot Intelligence with Splunk
☆256Oct 18, 2018Updated 7 years ago
Alternatives and similar repositories for Tango
Users that are interested in Tango are comparing it to the libraries listed below
Sorting:
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Malicious HTTP traffic explorer☆723Mar 16, 2023Updated 2 years ago
- An SMTP Honeypot☆280Dec 30, 2025Updated 2 months ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- A python script used to parse the SAM registry hive.☆76Jan 26, 2018Updated 8 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Modern Honey Network App for Splunk☆50Sep 30, 2019Updated 6 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- A Wordpress Honeypot☆185Feb 7, 2023Updated 3 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- Threat Intelligence APIs☆280Aug 14, 2023Updated 2 years ago