kingtuna / Hybrid-Darknet-ConceptLinks
☆25Updated 8 years ago
Alternatives and similar repositories for Hybrid-Darknet-Concept
Users that are interested in Hybrid-Darknet-Concept are comparing it to the libraries listed below
Sorting:
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- A malware/botnet analysis framework written in Ruby.☆196Updated last year
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- WebApp Honeypot for detecting Shell Shock exploit attempts☆56Updated 3 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- ☆21Updated 9 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Passive DNS V2☆60Updated 11 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- ☆22Updated 7 years ago
- integrating bro into yara☆33Updated 10 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Faraday Continuous Scanning☆34Updated 8 years ago
- YAPDNS☆39Updated 10 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Network Security Monitoring Framework☆47Updated 12 years ago
- DEPRECATED USE v3!☆59Updated 9 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 7 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago