desaster / kippo
Kippo - SSH Honeypot
☆1,646Updated last year
Alternatives and similar repositories for kippo:
Users that are interested in kippo are comparing it to the libraries listed below
- Modern Honey Network☆2,445Updated 2 months ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆5,365Updated this week
- Advanced Honeypot framework.☆1,240Updated last year
- Home of the dionaea honeypot☆732Updated 6 months ago
- Web Application Honeypot☆569Updated 6 months ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,025Updated 5 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,011Updated 3 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆373Updated 3 years ago
- ☆3,515Updated 11 months ago
- Credentials catching honeypot☆376Updated 9 months ago
- Malcom - Malware Communications Analyzer☆1,159Updated 7 years ago
- Binary analysis and management framework☆1,544Updated last year
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,686Updated 8 months ago
- Super Next generation Advanced Reactive honEypot☆457Updated 8 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,600Updated 4 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,083Updated 3 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,670Updated last year
- Malicious traffic detection system☆6,765Updated this week
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,691Updated 3 years ago
- SSH man-in-the-middle tool☆1,644Updated 3 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆641Updated 3 months ago
- A low to medium interaction honeypot.☆463Updated 11 months ago
- Sniffs sensitive data from interface or pcap☆1,730Updated last year
- A fully featured backdoor that uses Twitter as a C&C server☆768Updated 4 years ago
- A Suricata based IDS/IPS/NSM distro☆1,507Updated 6 months ago
- Loki - Simple IOC and YARA Scanner☆3,467Updated 2 months ago
- DNS Enumeration Script☆2,712Updated last week
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,001Updated 6 months ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 7 years ago
- Linux Exploit Suggester; based on operating system release number☆1,779Updated 10 years ago