honeynet / whisperpotLinks
VoIP honeypot system
☆20Updated last year
Alternatives and similar repositories for whisperpot
Users that are interested in whisperpot are comparing it to the libraries listed below
Sorting:
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆17Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Updated 2 weeks ago
- AIL project training materials☆35Updated last month
- A go-exploit to scan for implanted Cisco IOS XE Systems☆41Updated 10 months ago
- Passive OS detection based on SYN packets without Transmitting any Data☆47Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- 🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯☆64Updated 2 months ago
- Can you pay the ransom in your country?☆15Updated last year
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 8 years ago
- External twitter feeder for AIL framework☆16Updated 2 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆27Updated 7 years ago
- Incident Response Network Tools☆24Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆26Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆12Updated 2 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 3 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated 2 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- ☆15Updated 3 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 2 months ago