honeynet / riotpot
the IoT and OT (Operational Technology) Honeypot
☆20Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for riotpot
- Honeyscanner: A vulnerability analyzer for honeypots☆28Updated 2 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated last year
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆37Updated 6 months ago
- Threat Intel Platform for T-POTs☆135Updated this week
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆12Updated 4 years ago
- Scripts to deploy and update MISP in air-gapped environments☆16Updated 3 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆11Updated 2 years ago
- Sample programs to access the API☆61Updated 2 weeks ago
- A packet capture visualizer for industrial control networks.☆48Updated 11 months ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆60Updated last week
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆54Updated 5 months ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆18Updated 6 years ago
- A Spicy protocol analyzer for WireGuard☆28Updated 4 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆28Updated 5 months ago
- ☆48Updated 7 months ago
- AIL project training materials☆24Updated 2 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆29Updated last month
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆72Updated this week
- ☆16Updated 7 months ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆14Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated last month
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆67Updated 9 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated last month
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Operational Technology Cyber Attack Database☆44Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆76Updated 4 months ago