eightus / CyderLinks
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
☆12Updated 3 years ago
Alternatives and similar repositories for Cyder
Users that are interested in Cyder are comparing it to the libraries listed below
Sorting:
- Generate network maps from packet captures☆30Updated 5 years ago
- A platform built for easy-to-use automated network traffic analysis☆59Updated 2 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Distributed Honeypot☆62Updated 7 years ago
- CLI tool which uses URLScan to scan websites and download corresponding screenshots and DOMs.☆38Updated last year
- Python Code to Map Cell Towers From a Cellebrite Android Dump☆50Updated 5 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Updated 5 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 5 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆20Updated 6 years ago
- Twintelligence is a free Twitter OSINT tool☆52Updated 4 years ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 11 months ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated 11 months ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Utility for annotating Internet datasets with contextual metadata (e.g., origin AS, MaxMind GeoIP2, reverse DNS, and WHOIS)☆100Updated last month
- Open Source Intelligence☆25Updated 8 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆23Updated 4 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆170Updated 2 years ago
- Automating and Enhancing Nmap using Python☆17Updated 7 years ago
- Ready to run scripts for network analysis☆88Updated 3 months ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- Find phishing kits which use your brand/organization's files and image.☆238Updated 6 years ago
- A list of OPML Security Feeds☆73Updated 3 months ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆94Updated last month
- Multi-head SSH honeypot system.☆21Updated last year
- CapAnalysis source code repository☆87Updated 6 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Easily Expandable Wireless Intrusion Detection System☆31Updated 4 years ago