czardoz / hornet
SSH Multipot
☆22Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for hornet
- It's like a polaroid, but for domains☆24Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 4 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated 10 months ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Passive DNS V2☆62Updated 10 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- AYY LMAO☆21Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 3 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- ☆14Updated 9 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Help summarize a PCAP file☆33Updated 12 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 10 years ago
- Malware Analysis Zoo☆25Updated 7 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago