honeynet / shivaLinks
Spam Honeypot with Intelligent Virtual Analyzer
☆17Updated 11 years ago
Alternatives and similar repositories for shiva
Users that are interested in shiva are comparing it to the libraries listed below
Sorting:
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Service desk password tools.☆16Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A curated list of tools for incident response☆29Updated last year
- Spam trap management☆23Updated last year
- Dines is the definitive answer to DNS testing☆21Updated 6 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- PowerShell Utilities for Security Situational Awareness☆12Updated 8 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 12 years ago
- A content inspecting SMTP proxy☆17Updated 11 years ago
- See here:☆42Updated 12 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Plugins written for CVE-Search☆26Updated 4 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- ☆10Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- (Unofficial) Python API for http://namechk.com☆19Updated 9 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- sslscan tests SSL/TLS enabled services to discover supported cipher suites☆66Updated 14 years ago