hrbrmstr / pewpewLinks
Build your own IP Attack Maps with SOUND!
☆1,065Updated 5 months ago
Alternatives and similar repositories for pewpew
Users that are interested in pewpew are comparing it to the libraries listed below
Sorting:
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆1,039Updated 4 years ago
- Laika BOSS: Object Scanning System☆749Updated last year
- Incident Response Forensic Framework☆609Updated 6 years ago
- Malicious HTTP traffic explorer☆724Updated 2 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆510Updated 3 years ago
- Malcom - Malware Communications Analyzer☆1,165Updated 8 years ago
- A network sniffer that logs all DNS server replies for use in a passive DNS setup☆1,734Updated last year
- CRITs - Collaborative Research Into Threats☆909Updated 6 years ago
- Modern Honey Network☆2,468Updated last year
- Kippo - SSH Honeypot☆1,709Updated 2 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Updated last year
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,359Updated last week
- Tool to gather Threat Intelligence indicators from publicly available sources☆662Updated 6 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆946Updated 4 years ago
- Information Dump Monitor☆595Updated 7 years ago
- A low to medium interaction honeypot.☆473Updated last year
- Network Security Monitoring on Raspberry Pi type devices☆791Updated 7 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Updated 3 years ago
- Python low-interaction honeyclient☆1,021Updated 3 weeks ago
- DEPRECATED - MozDef: Mozilla Enterprise Defense Platform☆2,170Updated 4 years ago
- Web Application Honeypot☆594Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,107Updated 2 months ago
- ☆817Updated 8 years ago
- Binary analysis and management framework☆1,558Updated 2 years ago
- Advanced Honeypot framework.☆1,300Updated 2 years ago
- Fast Incident Response☆1,983Updated 3 weeks ago
- Distributed & real time digital forensics at the speed of the cloud☆1,203Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆829Updated 8 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Updated 8 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago