ciscocsirt / dhpView external linksLinks
Simple Docker Honeypot server emulating small snippets of the Docker HTTP API
☆33Oct 6, 2020Updated 5 years ago
Alternatives and similar repositories for dhp
Users that are interested in dhp are comparing it to the libraries listed below
Sorting:
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- A simple and effective phpmyadmin honeypot☆68Feb 11, 2018Updated 8 years ago
- DICOM Honeypot☆27Dec 5, 2025Updated 2 months ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing☆17Dec 29, 2015Updated 10 years ago
- Honeynet Project Static Site☆18Feb 3, 2026Updated last week
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago
- Log4j honeypot to capture payloads within HTTP headers, query parameters and POST requests.☆14Dec 15, 2021Updated 4 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Jul 7, 2020Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 8 months ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆17Dec 20, 2018Updated 7 years ago
- Webapplication Honeypot☆15May 12, 2013Updated 12 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Jan 22, 2023Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Low interaction MySQL honeypot written in C☆36Feb 5, 2026Updated last week
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- IP Cam Honeypot☆20Feb 28, 2024Updated last year
- Honeybag helps you to create 'bait archive' with any folders and files, notify you if someone accesses it☆16Sep 30, 2020Updated 5 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Collection of various files from infected hosts☆76Mar 22, 2022Updated 3 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Dec 22, 2023Updated 2 years ago
- Simple DNS honeypot script☆51Jan 23, 2026Updated 3 weeks ago
- md380-update☆26Feb 14, 2017Updated 8 years ago
- Hex Studio is a work in progress Hex viewer and editor.☆25Jun 7, 2017Updated 8 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- observation camera honeypot☆53Jun 18, 2015Updated 10 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago