eg-cert / dockpotLinks
☆52Updated 5 years ago
Alternatives and similar repositories for dockpot
Users that are interested in dockpot are comparing it to the libraries listed below
Sorting:
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Repo for autosnort scripts.☆157Updated 4 years ago
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- 🤖 Daily updated translation maps for T-Pot☆22Updated last year
- Nix Audit made easier (RHEL, CentOS)☆65Updated 5 months ago
- ☆141Updated last year
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- automate your MISP installs☆68Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Docker files for Security Onion☆42Updated 4 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- My network monitoring solution and tools that go along with it.☆62Updated 3 years ago
- Honeypot repo☆48Updated 10 years ago
- ☆138Updated 6 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆140Updated 6 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- A toolkit for Security Researchers☆128Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Transparent network tap☆119Updated 9 years ago
- ☆36Updated 4 years ago
- Malware Simulator - Pretend a malware infection by creating a text file into several locations on the local system and also in the networ…☆26Updated 7 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Nmap Script to scan for Winnti infections☆70Updated 7 years ago