czardoz / hornetLinks
SSH Multipot
☆24Updated 7 years ago
Alternatives and similar repositories for hornet
Users that are interested in hornet are comparing it to the libraries listed below
Sorting:
- It's like a polaroid, but for domains☆24Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated last year
- Honeypot log processor to create OTX Pulse entries☆28Updated 2 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- Passive DNS V2☆60Updated 11 years ago
- ☆49Updated 10 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 9 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- module for osquery to load Bro logs into tables☆28Updated 10 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- AYY LMAO☆22Updated 9 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- scripts to help beginners program in Bro☆21Updated 12 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆112Updated 2 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Spam trap management☆23Updated last year
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- Detect Phishing with Bro IDS☆19Updated 8 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Simple UDP honeypot script☆52Updated 2 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 10 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago