azizulhakim / u-pot
Honeypot framework for UPnP Device
☆12Updated 6 years ago
Alternatives and similar repositories for u-pot:
Users that are interested in u-pot are comparing it to the libraries listed below
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 8 months ago
- A simple way to exfiltrate data using spotify API☆18Updated 3 weeks ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- NVD/CVE as JSON files☆114Updated last week
- FACT analysis plug-in that maps software version to cves☆13Updated 5 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆79Updated 5 months ago
- Suricata rule and intel index☆30Updated last week
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆51Updated 6 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆10Updated 5 years ago
- Data exfiltration and covert communication tool☆38Updated 2 years ago
- tshark + ELK analytics virtual machine☆67Updated 2 months ago
- IotShark - Monitoring and Analyzing IoT Traffic☆92Updated 2 years ago
- Research project on heterogeneous IoT protocols modelling☆54Updated 3 years ago
- Passive ICS Network Scanner based on MAC Address Detection☆18Updated 4 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆15Updated 7 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Updated 4 years ago
- ☆12Updated 7 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆18Updated 4 years ago
- Metasploit modules developed to demonstrate insecure by design PLC's as part of Project Basecamp☆62Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 8 years ago
- CANBus protection used to isolate third party systems requiring OBDII access.☆19Updated 10 years ago
- Automatically exported from code.google.com/p/plcscan☆57Updated 10 years ago
- Set of data collected during a series of man-in-the-middle (MITM) attacks run against the Kenexis Portable Industrial Control System (ICS…☆27Updated 9 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆73Updated 3 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated 4 months ago
- Download pcap files from http://www.malware-traffic-analysis.net/☆75Updated 7 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆48Updated 4 years ago
- Basic RDP honeypot script☆30Updated 2 years ago
- Modbus VCR☆27Updated 7 years ago