cypwnpwnsocute / RedisHoneyPotLinks
High Interaction Honeypot Solution for Redis protocol
☆24Updated 4 years ago
Alternatives and similar repositories for RedisHoneyPot
Users that are interested in RedisHoneyPot are comparing it to the libraries listed below
Sorting:
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 5 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆43Updated last year
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 8 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆156Updated 4 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆74Updated last year
- Convert pcap files into richly-typed ZNG summary logs (Zeek, Suricata, and more)☆83Updated 3 months ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated last month
- Active C2 IoCs☆99Updated 2 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 4 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆58Updated 2 years ago
- ☆43Updated 2 years ago
- IoT and Operational Technology Honeypot☆103Updated last year
- A Go implementation of JARM☆119Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- ☆43Updated last month
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆158Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- tshark + ELK analytics virtual machine☆69Updated 6 months ago
- Suricata rule and intel index☆31Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆30Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆12Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Open source endpoint agent providing host information to Zeek. [v2]☆85Updated last month
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆56Updated 4 months ago