dutchcoders / trojeLinks
Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
☆44Updated 11 years ago
Alternatives and similar repositories for troje
Users that are interested in troje are comparing it to the libraries listed below
Sorting:
- YAPDNS☆39Updated 10 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- NTP logger/honeypot☆54Updated 11 years ago
- Threatbutt Suite☆37Updated 10 years ago
- A simple, but damn fast sinkhole☆64Updated 9 months ago
- a low-interaction honeypot☆94Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- A Network Inspection Tool☆82Updated 7 years ago
- ☆66Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Repository for Security Workshop content☆20Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- SSH Multipot☆23Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Converts the Clamav Virus Database definitions to YARA rules [GOLANG]☆52Updated 4 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆95Updated 10 years ago
- yara rules for crypto detection☆31Updated 11 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆109Updated 2 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Updated 9 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 8 years ago