dutchcoders / troje
Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
☆45Updated 10 years ago
Alternatives and similar repositories for troje:
Users that are interested in troje are comparing it to the libraries listed below
- SSH Multipot☆22Updated 6 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- ☆66Updated 9 years ago
- YAPDNS☆39Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- AYY LMAO☆21Updated 9 years ago
- A simple, but damn fast sinkhole☆64Updated 4 months ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- REST API based malware repository (abandoned)☆108Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- post-exploitation tools☆15Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Internet data processing tools☆54Updated 4 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago