dutchcoders / trojeLinks
Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
☆44Updated 10 years ago
Alternatives and similar repositories for troje
Users that are interested in troje are comparing it to the libraries listed below
Sorting:
- YAPDNS☆39Updated 10 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- SSH Multipot☆23Updated 7 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Threatbutt Suite☆37Updated 10 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- A simple, but damn fast sinkhole☆64Updated 7 months ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆26Updated 6 years ago
- ☆15Updated 8 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- ☆66Updated 9 years ago
- A simple ssh private key password recovery tool written in Go☆22Updated last year
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 5 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- a low-interaction honeypot☆94Updated 8 years ago