fw42 / honeymap
Real-time websocket stream of GPS events on a fancy SVG world map
☆219Updated 8 years ago
Alternatives and similar repositories for honeymap:
Users that are interested in honeymap are comparing it to the libraries listed below
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Honeypot deployment made easy☆235Updated 6 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- YAPDNS☆39Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 5 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- Repo for the Open Source version of NOVA☆75Updated last year
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Repo for autosnort scripts.☆156Updated 4 years ago
- DNSDB query scripts☆75Updated 5 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Create a list of bad actors from public IP blacklist.☆75Updated 6 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- ☆25Updated 8 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Threat Intelligence APIs☆277Updated last year
- ☆71Updated 3 years ago
- OpenFPC, Open Source Full Packet Capture☆71Updated 6 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 6 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆80Updated 9 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆84Updated 3 weeks ago