dutchcoders / trojeLinks
Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
☆45Updated 11 years ago
Alternatives and similar repositories for troje
Users that are interested in troje are comparing it to the libraries listed below
Sorting:
- NTP logger/honeypot☆55Updated 11 years ago
- YAPDNS☆39Updated 10 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- SSH Multipot☆24Updated 7 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- ☆66Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 6 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- A simple, but damn fast sinkhole☆65Updated 2 weeks ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆112Updated 2 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Updated 3 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- Threatbutt Suite☆37Updated 10 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 6 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Updated 4 years ago
- Suricata rules for Emerging Threats and funkyness☆75Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- The NoSQL Honeypot Framework☆103Updated 2 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆27Updated 6 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago