dutchcoders / trojeLinks
Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
☆44Updated 10 years ago
Alternatives and similar repositories for troje
Users that are interested in troje are comparing it to the libraries listed below
Sorting:
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- YAPDNS☆39Updated 9 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- post-exploitation tools☆15Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- A simple, but damn fast sinkhole☆64Updated 5 months ago
- SSH Multipot☆23Updated 7 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- For an Internet Service Provider, AS numbers are a logical representation of the other ISP peering or communicating with his autonomous s…☆21Updated 9 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- Convert libvirt-QEMU-save (LQS) files to raw memory files☆37Updated last year
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Threatbutt Suite☆37Updated 9 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆13Updated 7 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- REST API based malware repository (abandoned)☆108Updated 10 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago