A DICOM honeypot for detecting and logging unauthorized access attempts
☆52Mar 2, 2026Updated this week
Alternatives and similar repositories for DICOMHawk
Users that are interested in DICOMHawk are comparing it to the libraries listed below
Sorting:
- This is a honeypot for IP camera☆19Jul 10, 2023Updated 2 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆60Jan 2, 2026Updated 2 months ago
- Honeynet Project Static Site☆19Feb 16, 2026Updated 2 weeks ago
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 5 months ago
- ☆19Jun 6, 2017Updated 8 years ago
- IntelOwl's client library/SDK in golang.☆22May 6, 2025Updated 10 months ago
- Code for shelLM tool☆57Jan 28, 2025Updated last year
- High Interaction Honeypot Solution for Redis protocol☆25Apr 23, 2021Updated 4 years ago
- HL7 / FHIR honeypot☆26May 20, 2024Updated last year
- DICOM Honeypot☆27Dec 5, 2025Updated 3 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- IoT and Operational Technology Honeypot☆105Oct 7, 2023Updated 2 years ago
- Python Client for Nessus REST API☆13Feb 17, 2015Updated 11 years ago
- NeoLED - ESP32 Component for WS2812 LEDs Using I2S☆16Jan 22, 2026Updated last month
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆11May 10, 2024Updated last year
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- ☆15Sep 17, 2022Updated 3 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- ICPC codebook used by kiseki☆11Nov 11, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Template for Linux Kernel development on Apple Silicon (aarch64) using VS Code☆17Mar 17, 2024Updated last year
- Easy to configure Honeypot for Blue Team☆43Jun 18, 2025Updated 8 months ago
- Honeypot repo☆48Aug 10, 2015Updated 10 years ago
- CAD/CAM for a GPD Pocket 3 Cellular Module☆12Jun 10, 2023Updated 2 years ago
- AES-NI bruteforcer for bad Character Sets☆10Jan 17, 2021Updated 5 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Network Honeypot written in Rust☆15Feb 23, 2026Updated last week