kulinacs / cowrie-attackView external linksLinks
Mapping the ATT&CK matrix in a Cowrie honeypot
☆16Aug 31, 2018Updated 7 years ago
Alternatives and similar repositories for cowrie-attack
Users that are interested in cowrie-attack are comparing it to the libraries listed below
Sorting:
- A Security Analysis of Honeywords☆15Nov 28, 2017Updated 8 years ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 5 months ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Discover GPS location and private data exposure inside of images using this Burp & ZAP plugin.☆17Jun 18, 2025Updated 7 months ago
- An R package for implementing augmented network log anomaly detection procedures☆22Oct 13, 2019Updated 6 years ago
- WebSocket curl - The WebSocket CLI for developers☆26May 10, 2021Updated 4 years ago
- 👀 Analyze Websites and Resources They Request☆23Feb 3, 2019Updated 7 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- An experiment to host a website with the content served over DNS.☆27May 12, 2023Updated 2 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Nov 5, 2015Updated 10 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- ☆36Apr 29, 2025Updated 9 months ago
- 🕵🏽 macOS Big Sur desktop app to monitor active TCP connections through the lens of GreyNoise☆33Jun 11, 2022Updated 3 years ago
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Jun 29, 2022Updated 3 years ago
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- A template tool with no dependencies that works like Helm templates or Consul templates.☆17Jan 14, 2026Updated last month
- A Burp extension to show the Collaborator client in a tab☆36Dec 23, 2022Updated 3 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Feb 2, 2022Updated 4 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated last year
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Template repo for quickly creating an HTTP API with Rust hosted on AWS Lambda☆11Jul 26, 2022Updated 3 years ago
- Linux integrity monitoring for CentOS/RHEL☆10May 13, 2020Updated 5 years ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 10 months ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Minimal JavaScript Playground ⌨️☆13Apr 6, 2023Updated 2 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- 🔀 Tools to Organize and Visualize Tweets Including Tweet Threads (WIP)☆10Apr 25, 2018Updated 7 years ago
- IP Address utilities☆14Jun 29, 2021Updated 4 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- Automating simple report creating of threat intelligence using ChatGPT and Greynoise API.☆10Oct 3, 2023Updated 2 years ago
- ramcache implements an in-memory key/value cache with expirations based on access and insertion times.☆13Aug 7, 2018Updated 7 years ago
- A CLI tool for querying passive DNS services☆42Dec 15, 2023Updated 2 years ago
- ☆10Apr 10, 2024Updated last year
- A tiny search engine.☆13Sep 6, 2022Updated 3 years ago