johnnykv / mnemosyne
Normalizer for honeypot data.
☆45Updated 9 years ago
Alternatives and similar repositories for mnemosyne:
Users that are interested in mnemosyne are comparing it to the libraries listed below
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- ☆22Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- ☆16Updated 10 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Passive DNS V2☆61Updated 11 years ago
- ☆46Updated 7 years ago
- Nessus Vulnerability visualization for the web☆30Updated 9 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- API Tools☆27Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- ☆25Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- AYY LMAO☆21Updated 9 years ago