honeynet / honeyscanner
Honeyscanner: A vulnerability analyzer for honeypots
☆39Updated 8 months ago
Alternatives and similar repositories for honeyscanner
Users that are interested in honeyscanner are comparing it to the libraries listed below
Sorting:
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- THOR APT Scanner User Manual☆18Updated last week
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 7 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆17Updated this week
- the IoT and OT (Operational Technology) Honeypot☆23Updated last year
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- ☆48Updated 3 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆22Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- URL fingerprinting made easy☆86Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 6 months ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- ☆16Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆32Updated this week
- ☆18Updated 7 months ago
- ☆42Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 months ago
- Hashes of infamous malware☆26Updated last year
- Automated threat intel feed parsing and consolidation💻👾🤖☆27Updated this week
- A list of user agents belonging to common web scanners.☆40Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 3 months ago
- Yara scan Phishing Kit's Zip archive(s)☆58Updated last year
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- ☆17Updated 2 years ago