fabio-d / honeypotView external linksLinks
Honeypot that emulates several protocols (incl. SSH, telnet, SMTP, HTTP, SSL and SIP)
☆52Feb 19, 2016Updated 9 years ago
Alternatives and similar repositories for honeypot
Users that are interested in honeypot are comparing it to the libraries listed below
Sorting:
- ☆37Jul 10, 2015Updated 10 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- Go package for fexecve(3) and execveat(2)☆15Dec 24, 2025Updated last month
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- ☆12May 6, 2020Updated 5 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆14Mar 19, 2020Updated 5 years ago
- Generic Low Interaction Honeypot☆295Dec 31, 2025Updated last month
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- python wrapper for the nfdump cli application☆21Apr 8, 2021Updated 4 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- This repo is for demonstration purposes only.☆15Oct 20, 2015Updated 10 years ago
- Malware Classification using Graph Clustering☆14Nov 12, 2012Updated 13 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 6 years ago
- ☆16May 22, 2015Updated 10 years ago
- Home of the dionaea honeypot☆788Aug 1, 2024Updated last year
- Windows 8.1 + IE 11 Exploit☆18Jul 26, 2016Updated 9 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 8 years ago
- ☆16Mar 10, 2017Updated 8 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- 关于蜜罐的一些微小的统计工作☆30Aug 26, 2020Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Ansible playbooks that will without any user interaction provision Check Point Security Management server (SM) or Multi-Domain Management…☆11Jan 28, 2022Updated 4 years ago
- Trident is a trusted and secure communication platform for enabling better communication between groups of trusted parties☆22Apr 17, 2025Updated 9 months ago
- Honeypot built to mimic an insecure GoAhead Wifi Camera☆18Apr 4, 2017Updated 8 years ago
- Honeypot deployment made easy☆237Mar 13, 2019Updated 6 years ago