honeynet / honeyscanner
Honeyscanner: A vulnerability analyzer for honeypots
☆38Updated 8 months ago
Alternatives and similar repositories for honeyscanner:
Users that are interested in honeyscanner are comparing it to the libraries listed below
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- Hashes of infamous malware☆26Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated 3 months ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Yet another way to find where to report an abuse☆32Updated 3 months ago
- URL fingerprinting made easy☆86Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- THOR APT Scanner User Manual☆18Updated last week
- Ransomware groups posts☆39Updated this week
- AIL project training materials☆29Updated 2 months ago
- Open-source Fabric templates for cybersecurity and compliance☆17Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- ☆42Updated 3 weeks ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆32Updated 2 weeks ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆60Updated last month
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated 6 months ago
- ☆24Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- A library that scrapes Linkedin for user data☆23Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago