desaster / kippoLinks
Kippo - SSH Honeypot
☆1,700Updated last year
Alternatives and similar repositories for kippo
Users that are interested in kippo are comparing it to the libraries listed below
Sorting:
- Modern Honey Network☆2,462Updated 8 months ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,774Updated this week
- Home of the dionaea honeypot☆763Updated last year
- Web Application Honeypot☆581Updated last year
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,714Updated last year
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,024Updated 3 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆656Updated 9 months ago
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,728Updated 3 years ago
- Advanced Honeypot framework.☆1,268Updated last year
- ☆3,672Updated last year
- Binary analysis and management framework☆1,551Updated 2 years ago
- Credentials catching honeypot☆382Updated last year
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,029Updated 5 years ago
- Malicious HTTP traffic explorer☆720Updated 2 years ago
- Malcom - Malware Communications Analyzer☆1,160Updated 7 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,342Updated 6 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,007Updated 4 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,792Updated last month
- Modular and decentralised honeypot☆2,563Updated 3 months ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,101Updated 4 years ago
- Build your own IP Attack Maps with SOUND!☆1,055Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,769Updated 3 years ago
- virtual honeypots☆376Updated 2 years ago
- SSH man-in-the-middle tool☆1,683Updated 4 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆1,983Updated 4 years ago
- A low to medium interaction honeypot.☆469Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,736Updated 5 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆781Updated 4 years ago
- Open Source Tripwire®☆905Updated last year
- A Suricata based IDS/IPS/NSM distro☆1,558Updated 2 weeks ago