kulinacs / cowrie-attackView external linksLinks
Mapping the ATT&CK matrix in a Cowrie honeypot
☆16Aug 31, 2018Updated 7 years ago
Alternatives and similar repositories for cowrie-attack
Users that are interested in cowrie-attack are comparing it to the libraries listed below
Sorting:
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Universal Honey Pot☆29Aug 27, 2025Updated 5 months ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- An R package for implementing augmented network log anomaly detection procedures☆22Oct 13, 2019Updated 6 years ago
- 👀 Analyze Websites and Resources They Request☆23Feb 3, 2019Updated 7 years ago
- ☆27Dec 20, 2018Updated 7 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- the IoT and OT (Operational Technology) Honeypot☆30Mar 16, 2024Updated last year
- An experiment to host a website with the content served over DNS.☆27May 12, 2023Updated 2 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Nov 5, 2015Updated 10 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- 🕵🏽 macOS Big Sur desktop app to monitor active TCP connections through the lens of GreyNoise☆33Jun 11, 2022Updated 3 years ago
- A SSH Server in Go that logs username/password combos☆39Dec 8, 2024Updated last year
- A Zeek package for the passive detection of "Ripple20" vulnerabilities in the Treck TCP/IP stack.☆33Jun 29, 2022Updated 3 years ago
- ☆14Nov 11, 2014Updated 11 years ago
- A template tool with no dependencies that works like Helm templates or Consul templates.☆17Jan 14, 2026Updated last month
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- A Burp extension to show the Collaborator client in a tab☆36Dec 23, 2022Updated 3 years ago
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDK☆45Updated this week
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Feb 2, 2022Updated 4 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- CameraCipher Library (an IOCipher project)☆11Jul 14, 2015Updated 10 years ago
- ☆11May 16, 2022Updated 3 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated last year
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 2 weeks ago
- Linux integrity monitoring for CentOS/RHEL☆10May 13, 2020Updated 5 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 10 months ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆177Mar 23, 2021Updated 4 years ago
- C++ library to parse WARC files☆11Jan 27, 2019Updated 7 years ago
- Upstream for Non Interactive Zero Knowledge CTF platform☆10May 21, 2020Updated 5 years ago
- Get up and running with Llama 3.1, Mistral, Gemma 2, and other large language models.☆15Apr 24, 2025Updated 9 months ago
- A United States map CTFd theme☆12Aug 28, 2017Updated 8 years ago