cypwnpwnsocute / RedisHoneyPotLinks
High Interaction Honeypot Solution for Redis protocol
☆24Updated 4 years ago
Alternatives and similar repositories for RedisHoneyPot
Users that are interested in RedisHoneyPot are comparing it to the libraries listed below
Sorting:
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 11 months ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆82Updated 2 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆155Updated 3 months ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated last month
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 7 months ago
- Active C2 IoCs☆99Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆76Updated last month
- ☆96Updated 2 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- IoT and Operational Technology Honeypot☆103Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated last year
- HoneyHTTPD is a Python-based web server honeypot/service imitation builder. Great for honeypots or faking HTTP services.☆50Updated last year
- tshark + ELK analytics virtual machine☆67Updated 5 months ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆158Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 3 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆66Updated 3 years ago