fbb-git / stealthLinks
Stealth is a File Integrity scanner performing its work in a stealthy way.
☆12Updated 7 years ago
Alternatives and similar repositories for stealth
Users that are interested in stealth are comparing it to the libraries listed below
Sorting:
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- A low/zero interaction ssh authentication logging honeypot☆25Updated 2 months ago
- Collection of Auditd Examples and Presentations☆88Updated 5 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆111Updated 2 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated last year
- Central correlator for opencanary instances☆17Updated 3 years ago
- Probing a network for Ubiquiti devices and parsing responses☆19Updated 9 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- server for indexing and querying passive DNS observations☆49Updated last month
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 11 years ago
- Tachikoma is a security alerting framework for human beings☆22Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 10 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Updated 10 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆19Updated 5 years ago
- SSH Multipot☆24Updated 7 years ago
- BGP Hijack Detection☆115Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago