jekil / UDPot
Simple UDP honeypot script
☆48Updated last year
Alternatives and similar repositories for UDPot
Users that are interested in UDPot are comparing it to the libraries listed below
Sorting:
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- NTP logger/honeypot☆53Updated 11 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆107Updated last year
- Passive DNS V2☆60Updated 11 years ago
- Honeypot repo☆48Updated 9 years ago
- Quickly generate snort rules for IOCs☆18Updated 9 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- ☆22Updated 7 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 9 years ago
- AYY LMAO☆22Updated 9 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- DNS zone transfer research☆59Updated 8 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- OpenFlow Honeypot☆23Updated 12 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Updated 9 years ago