armedpot / honeytrap
Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner
☆43Updated 3 years ago
Alternatives and similar repositories for honeytrap:
Users that are interested in honeytrap are comparing it to the libraries listed below
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆42Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- An ICAP Server with yara scanner for URL and content.☆59Updated last month
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Updated 5 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆17Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Passive DNS V2☆62Updated 10 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- ☆27Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- repo for sharing stuff☆16Updated last year
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- HL7 / FHIR honeypot☆24Updated 8 months ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 12 years ago
- NTP logger/honeypot☆53Updated 10 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- A map displaying threat actors from the misp-galaxy☆32Updated 2 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 3 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago