ivre / masscannedLinks
Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
☆134Updated 3 weeks ago
Alternatives and similar repositories for masscanned
Users that are interested in masscanned are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆188Updated 2 weeks ago
- Signature based honeypot detector tool written in Golang☆107Updated 9 months ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 10 months ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆23Updated last week
- JA4TScan is an active TCP server fingerprinting tool.☆101Updated last year
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆191Updated 8 months ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆120Updated 2 weeks ago
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆77Updated 2 years ago
- l9explore - Digs the dirt☆122Updated 4 months ago
- packet captures of real-world ddos attacks☆165Updated 2 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated 4 months ago
- ☆85Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆77Updated last month
- Honeyscanner: A vulnerability analyzer for honeypots☆53Updated this week
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Updated 2 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Updated last year
- IOCs published by Black Lotus Labs☆124Updated 2 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- NIST-based CVE lookup store and API powered by Rust.☆136Updated 3 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆45Updated 3 weeks ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- Signing-key abuse and update exploitation framework☆132Updated 7 months ago
- The open ransomware payment tracker☆102Updated 4 months ago
- A fast and secure multi protocol honeypot.☆325Updated 3 years ago
- A phishing kit collector for scavengers☆219Updated last month