honeynet / checkpotLinks
Checkpot Honeypot Checker
☆46Updated 6 years ago
Alternatives and similar repositories for checkpot
Users that are interested in checkpot are comparing it to the libraries listed below
Sorting:
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Updated 4 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Updated 4 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Simple DDE object detector☆56Updated 7 years ago
- Process HTTP Pcaps With YARA☆106Updated 12 years ago
- rules to identify files containing juicy information like usernames, passwords etc☆127Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Updated 7 years ago
- ☆46Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆97Updated 5 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Development guide for Volatility Plugins☆23Updated 8 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Simulating Adversary Operations☆96Updated 7 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago