eightus / CyderLinks
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
☆12Updated 3 years ago
Alternatives and similar repositories for Cyder
Users that are interested in Cyder are comparing it to the libraries listed below
Sorting:
- Python rewrite of passive OS fingerprinting tool☆183Updated 4 months ago
- Find phishing kits which use your brand/organization's files and image.☆239Updated 6 years ago
- ☆61Updated 7 years ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆51Updated 7 years ago
- Scripts to help to detect anomalies in pcap file. Anomaly Detection using tensorflow and tshark.☆83Updated 5 years ago
- JA3 TLS Fingerprint database☆80Updated 5 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆223Updated 5 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆674Updated last year
- An awesome list of resources on deception-based security with honeypots and honeytokens☆176Updated 8 months ago
- OSfooler-ng prevents remote active/passive OS fingerprinting by tools like nmap or p0f☆213Updated 2 years ago
- Don't Just Search OSINT. Sweep It.☆316Updated 4 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- Machine Learning for Phishing Website Detection☆55Updated 5 years ago
- Automater - IP URL and MD5 OSINT Analysis☆550Updated last year
- Visualize network topologies and collect graph statistics based on pcap files☆353Updated 2 years ago
- A collection of public offensive and defensive security related scripts for InfoSec students.☆193Updated 6 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension☆381Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆81Updated last month
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆253Updated 2 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆267Updated 11 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Updated last year
- Generic Low Interaction Honeypot☆287Updated 3 weeks ago
- Hands-On Network Forensics by Nipun Jaswal☆52Updated 2 years ago
- A low to medium interaction honeypot.☆469Updated last year
- Web Application Honeypot☆585Updated last year
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆198Updated 2 years ago
- Credentials catching honeypot☆383Updated last year
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆203Updated 2 years ago
- Useful network monitoring, analysis, and active response tools used or mentioned in the SANS SEC503 course (https://www.sans.org/course/i…☆237Updated 8 months ago