A honeypot for malware that propagates via USB storage devices
☆103Mar 24, 2015Updated 11 years ago
Alternatives and similar repositories for ghost-usb-honeypot
Users that are interested in ghost-usb-honeypot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NTP logger/honeypot☆56Mar 27, 2014Updated 12 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- THP Forensic Challenges☆23Jul 28, 2023Updated 2 years ago
- honeypot go lang emulators☆11Feb 28, 2016Updated 10 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆60Dec 10, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Honeypot deployment made easy☆237Mar 13, 2019Updated 7 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Native module dumper☆13Aug 28, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Monitoring 'DNS' inside the Tor network☆93Nov 21, 2016Updated 9 years ago
- ☆12Aug 12, 2016Updated 9 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 11 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆49Apr 22, 2013Updated 12 years ago
- A Simple Network Stream Recorder☆35Mar 23, 2019Updated 7 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- ☆16Nov 10, 2015Updated 10 years ago
- PE Bliss - Cross-Platform Portable Executable C++ Library☆16Jan 23, 2018Updated 8 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- Checkpot Honeypot Checker☆27Aug 13, 2018Updated 7 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Malware Repository Framework☆98Mar 5, 2018Updated 8 years ago
- ☆28Nov 20, 2025Updated 4 months ago
- ☆12Feb 19, 2017Updated 9 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- ☆10Apr 8, 2018Updated 8 years ago
- Simple DNS honeypot script☆51Jan 23, 2026Updated 2 months ago
- Google Summer of Code 2012 project, supported by The Honeynet Project organization.☆43Jul 30, 2020Updated 5 years ago