johnnykv / mnemosyneView external linksLinks
Normalizer for honeypot data.
☆46Jun 19, 2015Updated 10 years ago
Alternatives and similar repositories for mnemosyne
Users that are interested in mnemosyne are comparing it to the libraries listed below
Sorting:
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- A nodejs web application honeypot☆47Aug 23, 2015Updated 10 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 12 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- 👾 personal resources and scripts over the years (dotfiles, shell, zsh, git, tmux, vim, vpns, chef, scripts, configs, rooting devices, et…☆16Oct 29, 2025Updated 3 months ago
- Modern Honey Network App for Splunk☆50Sep 30, 2019Updated 6 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 10 years ago
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Sep 30, 2019Updated 6 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Automated IOC-Generation scripts and tools☆24Sep 14, 2016Updated 9 years ago
- Webapplication Honeypot☆15May 12, 2013Updated 12 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- PHP Script demonstrating a smart honey pot.☆18Apr 19, 2014Updated 11 years ago
- MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality …☆17Sep 25, 2018Updated 7 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- WordPress Honeypot☆35Jan 18, 2018Updated 8 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆473Jan 19, 2019Updated 7 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆17May 2, 2024Updated last year
- Cobra-W -> Cobra-RE 将进一步提升漏洞发现的准确性并降低漏报率(弃坑了)☆16Aug 15, 2020Updated 5 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 10 years ago
- A streamlined way to create STIX documents!☆32Apr 30, 2014Updated 11 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Aug 12, 2014Updated 11 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- A Wordpress Honeypot☆185Feb 7, 2023Updated 3 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago