blaverick62 / SIREN
Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network
☆13Updated 6 years ago
Alternatives and similar repositories for SIREN:
Users that are interested in SIREN are comparing it to the libraries listed below
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- FastIR Agent is a Windows service to execute FastIR Collector on demand☆14Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Network sinkhole for isolated malware analysis☆40Updated 6 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago
- The plugin repository for Honeycomb, the honeypot framework by Cymmetria☆27Updated last year
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- post-exploitation tools☆15Updated 6 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- ☆25Updated 3 years ago
- AYY LMAO☆21Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago