honeynet / whisperpot
VoIP honeypot system
☆13Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for whisperpot
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Extracted data & informations from the Conti & TrickBot leaks.☆14Updated 2 years ago
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆14Updated 2 years ago
- Bustr is a utility built to discover if any new Usb, Storage, Phone or Bluetooth device has been attached/paired with system☆10Updated 3 years ago
- ☆14Updated 3 years ago
- Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, O…☆4Updated last year
- Automation platform for open source intelligence☆13Updated last year
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Updated 3 years ago
- A Nginx reverse proxy that authenticates users using their personal certificates. Includes everything to create and revoke those certific…☆26Updated 3 years ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆20Updated this week
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆16Updated 8 months ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆24Updated 3 years ago
- A Network Automation framework focused on Cyber-Security☆47Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated last year
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cybersecurity packet capture (PCAP) tools.☆18Updated 2 years ago
- ☆17Updated 8 months ago
- Python RAT with reverse connection and asymmetric encrypted communications☆14Updated 4 years ago
- External twitter feeder for AIL framework☆15Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆35Updated 6 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆13Updated 11 months ago