honeynet / whisperpot
VoIP honeypot system
☆18Updated 11 months ago
Alternatives and similar repositories for whisperpot:
Users that are interested in whisperpot are comparing it to the libraries listed below
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 9 months ago
- External twitter feeder for AIL framework☆17Updated last year
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆15Updated 2 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 3 years ago
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆45Updated 9 months ago
- VoIPShark is a open source VoIP Analysis Platform which will allow people to analyze live or stored VoIP traffic, easily decrypt encrypte…☆82Updated 5 years ago
- ☆19Updated 11 months ago
- A Darktrace CLI written in Python☆15Updated 5 years ago
- ☆14Updated 4 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆17Updated 11 months ago
- ☆21Updated last year
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated 10 months ago
- A co-simulation framework for reasearching cybersecurity in power grids.☆20Updated 2 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Script fingerprinting systems based on shodan.io data☆13Updated 6 years ago
- External telegram feeder for AIL framework☆14Updated 2 weeks ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 8 months ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆22Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 2 years ago
- A simple way to exfiltrate data using spotify API☆18Updated 3 weeks ago
- collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Updated this week