docker based telnet honeypot
☆80Feb 19, 2018Updated 8 years ago
Alternatives and similar repositories for mehrai
Users that are interested in mehrai are comparing it to the libraries listed below
Sorting:
- ☆21Aug 25, 2015Updated 10 years ago
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆48Nov 24, 2024Updated last year
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- A framework for analysis, stimulation, and detection of Android repackaged malware (under construction)☆11Apr 18, 2018Updated 7 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Open Source Telnet Honeypot☆106Mar 20, 2017Updated 8 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Mar 28, 2022Updated 3 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Feb 27, 2018Updated 8 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Aug 1, 2015Updated 10 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆94Dec 23, 2025Updated 2 months ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Scans the typos of candidate election pages for typosquatters☆18Oct 25, 2018Updated 7 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Script to send kippo/cowrie login attempt information to https://isc.sans.edu/ssh.html☆16Jan 12, 2017Updated 9 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 8 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Mar 5, 2017Updated 8 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- ☆338Nov 23, 2016Updated 9 years ago