cypwnpwnsocute / RedisHoneyPotLinks
High Interaction Honeypot Solution for Redis protocol
☆24Updated 4 years ago
Alternatives and similar repositories for RedisHoneyPot
Users that are interested in RedisHoneyPot are comparing it to the libraries listed below
Sorting:
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆36Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆66Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 5 months ago
- Suricata rule and intel index☆32Updated last week
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆74Updated last year
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆142Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆44Updated last year
- Active C2 IoCs☆99Updated 2 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated 3 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- YaraScanner is a file pattern-matching tool based on YARA rules.☆58Updated 2 years ago
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆87Updated 4 months ago
- ☆44Updated 2 months ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 9 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 7 months ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- ☆12Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆37Updated 3 weeks ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated 2 weeks ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- A Go implementation of JARM☆119Updated 3 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated 3 months ago
- Signature based honeypot detector tool written in Golang☆103Updated 6 months ago