bocajspear1 / honeyhttpdLinks
HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.
☆50Updated last year
Alternatives and similar repositories for honeyhttpd
Users that are interested in honeyhttpd are comparing it to the libraries listed below
Sorting:
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated last week
- Curated list of awesome, open source data exfiltration tools☆61Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆36Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ☆58Updated this week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Simple High Interaction Honeypot Solution for SMB protocol☆49Updated 4 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆96Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- A semi-curated list of Security Feeds☆137Updated 2 years ago
- ☆96Updated 4 months ago
- URL fingerprinting made easy☆89Updated last year
- ☆69Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆198Updated 2 years ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆117Updated 4 months ago
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆36Updated 3 months ago
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆82Updated last month
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year