honeynet / honeyscanner
Honeyscanner: A vulnerability analyzer for honeypots
☆28Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for honeyscanner
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆54Updated 5 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆108Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 2 years ago
- URL fingerprinting made easy☆79Updated 7 months ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆28Updated 2 weeks ago
- Ransomware groups posts☆35Updated this week
- Distributed nmap.☆12Updated last year
- NSE script which leverages the Censys Search API for passive data collection☆57Updated 2 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆74Updated last month
- ☆42Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆38Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆30Updated last week
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- ☆14Updated 3 years ago
- Script to test NetSec capabilities.☆21Updated last year
- the IoT and OT (Operational Technology) Honeypot☆20Updated 8 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 8 months ago
- Yara scan Phishing Kit's Zip archive(s)☆54Updated 7 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆44Updated last year
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆25Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆23Updated last week
- CLI tools using Harpoon features☆21Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago