VoIP honeypot system
☆22Apr 2, 2024Updated 2 years ago
Alternatives and similar repositories for whisperpot
Users that are interested in whisperpot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- the IoT and OT (Operational Technology) Honeypot☆30Mar 16, 2024Updated 2 years ago
- ☆36Apr 4, 2026Updated 2 weeks ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- Extensible Platform for Malware Analysis☆17Jan 14, 2021Updated 5 years ago
- Cyder is a Honeypot that can imitate any machines Operating System (OS) that is available in the NMAP database☆12May 26, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Multi-head SSH honeypot system.☆25Mar 21, 2024Updated 2 years ago
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated 2 months ago
- Yara Rules for Modern Malware☆79Mar 3, 2024Updated 2 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- Source code for 'Pro Spark Streaming' by Zubair Nabi☆11Mar 27, 2017Updated 9 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated 2 weeks ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆46Nov 10, 2025Updated 5 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- The samples referenced in my book, Evasive Malware (No starch Press)☆59Feb 20, 2026Updated last month
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Spiders a website using the darknet via Tor☆12Jun 18, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Phone number information lookup, validation, carrier name, geo and timezone infos, Verify phone number, validate format, checking carrie…☆15Nov 22, 2025Updated 4 months ago
- This is a comprehensive guide on how you can automate your feature engineering process.☆11Jun 25, 2018Updated 7 years ago
- BitTorrent DHT Protocol && DHT Spider,faster than shiyanhui/dht☆12Aug 30, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Antivirus Emulator Fingerprints☆30Oct 12, 2018Updated 7 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Documentation about ReaQta DeStra® Engine☆11Feb 7, 2022Updated 4 years ago
- Wanna countdown to something? Then you have come to the right place!☆10Nov 7, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- A browser based mapping tool to tie Kismet, Sparrow WiFi, and other RF related data sources into one interface.☆15Sep 6, 2021Updated 4 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Elasticsearch honeypot written in Python with Bottle framework☆18Apr 12, 2019Updated 7 years ago
- Updated version of pywallet - a Bitcoin wallet importer/exporter☆20Jul 10, 2025Updated 9 months ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago