basilfx / kippo-extra
Set of extra commands for kippo, the SSH honeypot daemon
☆30Updated 9 years ago
Alternatives and similar repositories for kippo-extra:
Users that are interested in kippo-extra are comparing it to the libraries listed below
- YAPDNS☆39Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- module for osquery to load Bro logs into tables☆28Updated 9 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 8 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆40Updated 5 months ago
- WordPress Honeypot☆32Updated 7 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆51Updated 8 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- SSH Multipot☆22Updated 6 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- ☆56Updated 7 years ago
- AYY LMAO☆21Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆24Updated 5 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 9 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- IRMA ansible☆24Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- ☆78Updated 9 years ago