desaster / kippoLinks
Kippo - SSH Honeypot
☆1,708Updated 2 years ago
Alternatives and similar repositories for kippo
Users that are interested in kippo are comparing it to the libraries listed below
Sorting:
- Modern Honey Network☆2,465Updated last year
- Web Application Honeypot☆593Updated last year
- Home of the dionaea honeypot☆787Updated last year
- Advanced Honeypot framework.☆1,300Updated 2 years ago
- Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/☆6,096Updated last week
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,731Updated last year
- DNS Exfiltration tool for stealthily sending files over DNS requests.☆1,734Updated 3 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,037Updated 4 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,027Updated 5 years ago
- Malcom - Malware Communications Analyzer☆1,166Updated 8 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆785Updated 5 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆666Updated last year
- Credentials catching honeypot☆387Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆1,343Updated 7 years ago
- Binary analysis and management framework☆1,557Updated 2 years ago
- A low to medium interaction honeypot.☆473Updated last year
- My collection of nmap NSE scripts☆985Updated 3 years ago
- Build your own IP Attack Maps with SOUND!☆1,066Updated 4 months ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,006Updated 4 years ago
- A Suricata based NDR distribution☆1,584Updated 4 months ago
- HonSSH is designed to log all SSH communications between a client and server.☆377Updated 4 years ago
- virtual honeypots☆392Updated 2 years ago
- Malicious HTTP traffic explorer☆724Updated 2 years ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,109Updated 4 years ago
- Pulled Pork for Snort and Suricata rule management (from Google code)☆442Updated 4 years ago
- Python low-interaction honeyclient☆1,020Updated this week
- SSH man-in-the-middle tool☆1,730Updated 4 years ago
- ☆3,815Updated last year
- Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, Ex…☆1,601Updated 7 months ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Updated last year