The Intelligent Honey Net Project attempts to create actionable information from honeypots
☆65Nov 5, 2015Updated 10 years ago
Alternatives and similar repositories for IntelligentHoneyNet
Users that are interested in IntelligentHoneyNet are comparing it to the libraries listed below
Sorting:
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- ☆28Dec 20, 2018Updated 7 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Aug 31, 2018Updated 7 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Aug 3, 2019Updated 6 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Mar 28, 2022Updated 3 years ago
- Coding examples for the OpenDNS Investigate API☆24Nov 2, 2019Updated 6 years ago
- A Simple Elasticsearch Honeypot☆190Jul 14, 2015Updated 10 years ago
- A web application for running shell commands interactively on your server☆21Dec 22, 2016Updated 9 years ago
- A low to medium interaction honeypot.☆473Mar 21, 2024Updated last year
- ☆37Jul 10, 2015Updated 10 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- The purpose of this document is to provide guidance required for sensor data producers and consumers to implement a sensor information en…☆11Dec 17, 2020Updated 5 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- ☆21Aug 25, 2015Updated 10 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- An SMTP Honeypot☆280Dec 30, 2025Updated 2 months ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Simple DNS honeypot script☆51Jan 23, 2026Updated last month
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- Spam Honeypot with Intelligent Virtual Analyzer☆140Mar 31, 2025Updated 11 months ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆51Jan 25, 2018Updated 8 years ago
- Modern Honey Network App for Splunk☆50Sep 30, 2019Updated 6 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Hex Calculator for Windows☆13Dec 2, 2016Updated 9 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Miscellaneous scripts for analyzing protocols and systems☆14Jun 24, 2016Updated 9 years ago