Honeypot deployment made easy
☆237Mar 13, 2019Updated 7 years ago
Alternatives and similar repositories for beeswarm
Users that are interested in beeswarm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆152Jul 11, 2015Updated 10 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆149Jun 27, 2022Updated 3 years ago
- A low to medium interaction honeypot.☆472Mar 21, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- A honeypot for malware that propagates via USB storage devices☆103Mar 24, 2015Updated 11 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Jan 2, 2022Updated 4 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- A Wordpress Honeypot☆185Feb 7, 2023Updated 3 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Mar 28, 2022Updated 3 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Web Application Honeypot☆597Jul 23, 2024Updated last year
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Modern Honey Network☆2,470Nov 30, 2024Updated last year
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Kippo - SSH Honeypot☆1,712Nov 19, 2023Updated 2 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- Python low-interaction honeyclient☆1,021Updated this week
- A Network Inspection Tool☆82Oct 13, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- Cartero - Social Engineering Framework☆176Mar 8, 2026Updated 2 weeks ago
- Spam Honeypot with Intelligent Virtual Analyzer☆140Mar 31, 2025Updated 11 months ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- ICS/SCADA honeypot☆1,438Dec 24, 2024Updated last year
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago