ikoniaris / kippo2elasticsearch
Transfer Kippo data to ElasticSearch
☆18Updated 9 years ago
Alternatives and similar repositories for kippo2elasticsearch:
Users that are interested in kippo2elasticsearch are comparing it to the libraries listed below
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Masscan integrated with Shodan API☆41Updated 7 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆35Updated 2 years ago
- Passive DNS V2☆61Updated 11 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- ☆47Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- AYY LMAO☆21Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- ☆22Updated 7 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 6 months ago
- Prometheus Firewall Analyzer☆47Updated 9 years ago
- ☆24Updated 10 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Enrich a host with open source security information☆27Updated 9 years ago