dutchcoders / trojeLinks
Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
☆44Updated 11 years ago
Alternatives and similar repositories for troje
Users that are interested in troje are comparing it to the libraries listed below
Sorting:
- YAPDNS☆39Updated 10 years ago
- NTP logger/honeypot☆54Updated 11 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Threatbutt Suite☆37Updated 10 years ago
- ☆66Updated 9 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- SSH Multipot☆23Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Exfiltrate files via DNS☆95Updated 11 years ago
- A simple, but damn fast sinkhole☆64Updated 8 months ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Updated 4 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 11 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆14Updated 7 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Naively estimate entropic probability☆38Updated 3 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago