mrschyte / dockerpot
A docker based honeypot.
☆149Updated 10 years ago
Alternatives and similar repositories for dockerpot:
Users that are interested in dockerpot are comparing it to the libraries listed below
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- Visualize statistics from a Kippo SSH honeypot☆134Updated last year
- ☆78Updated 9 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 8 years ago
- Honeypot deployment made easy☆235Updated 6 years ago
- Minion☆354Updated 6 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆119Updated 8 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆414Updated 2 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- A Simple Elasticsearch Honeypot☆186Updated 9 years ago
- Kvasir: Penetration Test Data Management☆427Updated 6 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 8 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Bro IDS programs collection.☆145Updated 5 years ago
- Db Database Assessment Tool☆209Updated 6 years ago
- Naively estimate entropic probability☆38Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- use ambiguous HTTP to circumvent security systems☆94Updated last year