ivre / masscannedLinks
Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hosted alternative to GreyNoise.
☆123Updated last week
Alternatives and similar repositories for masscanned
Users that are interested in masscanned are comparing it to the libraries listed below
Sorting:
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.☆182Updated 4 months ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆229Updated 3 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆160Updated last year
- Signature based honeypot detector tool written in Golang☆103Updated 5 months ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- JA4TScan is an active TCP server fingerprinting tool.☆88Updated last year
- zero-trust remote firewall instrumentation☆252Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- NIST-based CVE lookup store and API powered by Rust.☆132Updated this week
- GPS is a scanning platform that learns and predicts the location of IPv4 services across all 65K ports.☆70Updated 2 years ago
- ☆82Updated 2 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆46Updated last year
- ☆32Updated 8 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- findCDN is a tool created to help accurately identify what CDN a domain is using.☆118Updated 3 months ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆36Updated 3 weeks ago
- Signing-key abuse and update exploitation framework☆130Updated 3 months ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated last year
- packet captures of real-world ddos attacks☆162Updated 2 months ago
- 🚀 A lightweight, fast, and comprehensive solution for traffic analysis and intrusion detection.☆20Updated last week
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Updated 4 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆105Updated this week
- A fast and secure multi protocol honeypot.☆323Updated 3 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆115Updated 2 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆91Updated 9 months ago