eg-cert / dockpot
☆52Updated 5 years ago
Alternatives and similar repositories for dockpot:
Users that are interested in dockpot are comparing it to the libraries listed below
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Repo for autosnort scripts.☆156Updated 4 years ago
- Passive Network Audit Framework☆32Updated 6 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated this week
- Honeypot repo☆48Updated 9 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- ☆47Updated 10 years ago
- Nix Audit made easier (RHEL, CentOS)☆64Updated 3 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- automate your MISP installs☆67Updated 4 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Docker files for Security Onion☆40Updated 4 years ago
- Transparent network tap☆116Updated 9 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- Deploy MISP Project software with Vagrant.☆43Updated 4 years ago
- Different tools, koen.vanimpe@cudeso.be☆109Updated 2 weeks ago
- ☆48Updated 4 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆85Updated 6 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 2 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆66Updated 2 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆143Updated 2 years ago
- Dashboards and loader for ROCK NSM dashboards☆48Updated 2 years ago