eightus / CyderLinks
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
☆12Updated 3 years ago
Alternatives and similar repositories for Cyder
Users that are interested in Cyder are comparing it to the libraries listed below
Sorting:
- Find phishing kits which use your brand/organization's files and image.☆240Updated 7 years ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- Python rewrite of passive OS fingerprinting tool☆204Updated last month
- Visualize network topologies and collect graph statistics based on pcap files☆355Updated 2 years ago
- damn simple honey pot☆19Updated 9 years ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆52Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 6 months ago
- Hands-On Network Forensics by Nipun Jaswal☆62Updated 2 years ago
- A native and unofficial implementation of p0f3 in Python with extra analysis features: It's p0f3+!☆26Updated 3 years ago
- ☆62Updated 7 years ago
- OSfooler-ng prevents remote active/passive OS fingerprinting by tools like nmap or p0f☆215Updated 2 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Updated last week
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Updated last year
- CyRIS: Cyber Range Instantiation System☆109Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Updated 2 years ago
- An SMTP Honeypot☆280Updated last month
- Cybersecurity - a python3 script to parse and analyze .msg and .eml email files☆14Updated 6 years ago
- Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)☆297Updated 4 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension☆377Updated 7 years ago
- Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately networ…☆105Updated 5 years ago
- Don't Just Search OSINT. Sweep It.☆314Updated 5 years ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆211Updated 2 years ago
- An awesome list of resources on deception-based security with honeypots and honeytokens☆180Updated last year
- Automater - IP URL and MD5 OSINT Analysis☆554Updated last year
- A list of Autopsy awesome plugins.☆76Updated 4 years ago
- ☆34Updated 7 years ago
- Script to perform bulk local GeoIP lookups (ASN and geo) for IP addresses☆102Updated 6 years ago
- Credentials catching honeypot☆387Updated last year
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆335Updated 3 years ago