Honeypot deployment made easy
☆237Mar 13, 2019Updated 7 years ago
Alternatives and similar repositories for beeswarm
Users that are interested in beeswarm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆152Jul 11, 2015Updated 10 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆149Jun 27, 2022Updated 3 years ago
- A low to medium interaction honeypot.☆472Mar 21, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆60Dec 10, 2014Updated 11 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 7 years ago
- A honeypot for malware that propagates via USB storage devices☆103Mar 24, 2015Updated 11 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Jan 2, 2022Updated 4 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆331Apr 19, 2017Updated 8 years ago
- Query and report user logons relations from MS Windows Security Events☆244Aug 9, 2018Updated 7 years ago
- A Wordpress Honeypot☆183Feb 7, 2023Updated 3 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Mar 28, 2022Updated 4 years ago
- XMLRPC server for password cracking☆33Jan 20, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Web Application Honeypot☆598Jul 23, 2024Updated last year
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Modern Honey Network☆2,468Nov 30, 2024Updated last year
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- Kippo - SSH Honeypot☆1,712Nov 19, 2023Updated 2 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- Python low-interaction honeyclient☆1,023Updated this week
- A Network Inspection Tool☆82Oct 13, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- Cartero - Social Engineering Framework☆176Mar 8, 2026Updated last month
- Spam Honeypot with Intelligent Virtual Analyzer☆140Mar 31, 2025Updated last year
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20May 18, 2016Updated 9 years ago
- ICS/SCADA honeypot☆1,457Updated this week
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago