fw42 / honeymapLinks
Real-time websocket stream of GPS events on a fancy SVG world map
☆220Updated 8 years ago
Alternatives and similar repositories for honeymap
Users that are interested in honeymap are comparing it to the libraries listed below
Sorting:
- Threat Analysis, Reconnaissance, and Data Intelligence System☆124Updated 9 years ago
- Honeynet Project generic authenticated datafeed protocol☆215Updated last year
- Templates for Kibana/Logstash to use with Suricata IDPS☆80Updated 9 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Honeypot repo☆48Updated 9 years ago
- Honeypot deployment made easy☆236Updated 6 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Repo for autosnort scripts.☆158Updated 4 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Improvements of/over the original rule2alert☆56Updated 10 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- ☆71Updated 3 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Web service for scanning pcaps with snort☆109Updated 6 years ago
- YAPDNS☆39Updated 10 years ago
- A python multithreaded script to make use of Qualys ssllabs api to test SSL flaws☆41Updated 7 years ago
- Docker container for MISP☆96Updated 7 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Updated 3 years ago
- OpenFPC, Open Source Full Packet Capture☆72Updated 6 years ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- ☆75Updated 3 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Updated 5 years ago