bocajspear1 / honeyhttpdLinks
HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.
☆51Updated last year
Alternatives and similar repositories for honeyhttpd
Users that are interested in honeyhttpd are comparing it to the libraries listed below
Sorting:
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated this week
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- ☆53Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 6 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆97Updated last week
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆81Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Curated list of awesome, open source data exfiltration tools☆62Updated 3 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 10 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Updated 7 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linux☆84Updated 3 weeks ago
- Simple High Interaction Honeypot Solution for SMB protocol☆49Updated 4 years ago
- ☆25Updated 2 months ago
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago