betheroot / pghoneyLinks
Low-interaction Postgres Honeypot
☆19Updated last year
Alternatives and similar repositories for pghoney
Users that are interested in pghoney are comparing it to the libraries listed below
Sorting:
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 7 years ago
- Amun Honeypot☆62Updated last year
- Scripts to detect Fast-Flux and DGA using DNS query responses☆43Updated 8 years ago
- Masscan integrated with Shodan API☆41Updated 8 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 11 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- HoneySAP: SAP Low-interaction research honeypot☆50Updated 2 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 4 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER ma…☆35Updated 11 months ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- NMap XML decoding for logstash☆28Updated 2 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago