jekil / UDPot
Simple UDP honeypot script
☆48Updated last year
Alternatives and similar repositories for UDPot:
Users that are interested in UDPot are comparing it to the libraries listed below
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆105Updated last year
- NTP logger/honeypot☆52Updated 10 years ago
- Quickly generate snort rules for IOCs☆18Updated 9 years ago
- Passive DNS V2☆62Updated 10 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 8 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 8 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- DNS zone transfer research☆57Updated 8 years ago
- ☆48Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆47Updated 6 years ago
- Passive DNS visualization and Passive DNS server toolkit☆35Updated 12 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 2 years ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Honeypot repo☆47Updated 9 years ago
- ☆47Updated 8 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 3 years ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33Updated 8 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- ☆85Updated 11 years ago
- DNSDB query scripts☆75Updated 4 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- API to use Cymru services☆27Updated 11 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago