bocajspear1 / honeyhttpdLinks
HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.
☆53Updated last year
Alternatives and similar repositories for honeyhttpd
Users that are interested in honeyhttpd are comparing it to the libraries listed below
Sorting:
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Updated last week
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- ☆61Updated this week
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Updated 4 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆50Updated 4 years ago
- bap - http Basic Authentication honeyPot☆53Updated 11 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- A phishing kit collector for scavengers☆220Updated 3 weeks ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆163Updated 10 months ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆109Updated 3 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆58Updated last month
- URL fingerprinting made easy☆90Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 4 years ago
- Faraday's Command Line Interface☆51Updated 2 weeks ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- ☆69Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Updated 3 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25Updated 6 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated 3 weeks ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Updated 5 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆47Updated 3 years ago