basilfx / kippo-extra
Set of extra commands for kippo, the SSH honeypot daemon
☆30Updated 9 years ago
Alternatives and similar repositories for kippo-extra:
Users that are interested in kippo-extra are comparing it to the libraries listed below
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- SSH Multipot☆22Updated 7 years ago
- WordPress Honeypot☆32Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- YAPDNS☆39Updated 9 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 6 months ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 10 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- AYY LMAO☆22Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- ☆24Updated 5 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Universal Honey Pot☆29Updated 2 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Network Defender Toolkit☆18Updated 11 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year