bontchev / cowrieLinks
Cowrie SSH/Telnet Honeypot
☆12Updated 7 years ago
Alternatives and similar repositories for cowrie
Users that are interested in cowrie are comparing it to the libraries listed below
Sorting:
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- ☆58Updated 11 years ago
- A warehouse for your malware☆136Updated 2 months ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- An extensible honeypot framework☆95Updated 3 years ago
- Rogue AP killer☆91Updated 8 years ago
- Transparent network tap☆122Updated 10 years ago
- SMTP server / sinkhole for collecting spam☆46Updated 7 years ago
- Smoking Linux Every Day!☆56Updated 5 years ago
- VirusTotal tools☆92Updated 5 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Updated 8 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- ☆52Updated 7 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- Leak File Analyzer☆63Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 9 years ago
- ☆50Updated 9 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Updated 7 years ago
- Modified edition of cuckoo☆18Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago