eightus / CyderLinks
Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database
☆12Updated 3 years ago
Alternatives and similar repositories for Cyder
Users that are interested in Cyder are comparing it to the libraries listed below
Sorting:
- Find phishing kits which use your brand/organization's files and image.☆240Updated 7 years ago
- 'Packet Capture Forensic Evidence eXtractor' is a tool that finds and extracts files from packet capture files☆225Updated 5 years ago
- Python rewrite of passive OS fingerprinting tool☆204Updated last month
- Data Driven Threat Hunting on the RaspberryPi☆31Updated 4 years ago
- Script to scrape untappd.com content☆155Updated 6 months ago
- Python3 and Raspberry Pi based NetFlow Traffic Analysis leveraging Shodan's API, Twilio, GeoIP, and Folium to produce interactive maps an…☆52Updated 7 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Updated 6 years ago
- Visualize network topologies and collect graph statistics based on pcap files☆355Updated 2 years ago
- Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension☆377Updated 7 years ago
- Don't Just Search OSINT. Sweep It.☆314Updated 5 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆679Updated 2 years ago
- A list of Autopsy awesome plugins.☆76Updated 4 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Updated last week
- Automater - IP URL and MD5 OSINT Analysis☆554Updated last year
- Gather Open-Source Intelligence using PowerShell.☆178Updated 6 years ago
- damn simple honey pot☆19Updated 9 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆93Updated this week
- An extendable tool to Collect, Crawl and Monitor onion sites on tor network and index collected information on Elasticsearch☆347Updated 3 years ago
- JA3 TLS Fingerprint database☆81Updated 6 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Updated 3 years ago
- Python3 interface for the EmailRep API☆54Updated 5 years ago
- Open-source python project to handle the storage and linking of open-source intelligence (ala Maltego)☆120Updated 7 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 6 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆172Updated 2 years ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆16Updated 3 years ago
- Generic Low Interaction Honeypot☆294Updated last month
- WhatsApp Forensic Tool☆174Updated 5 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.☆273Updated 11 years ago
- Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network.☆326Updated last year