mrschyte / dockerpotLinks
A docker based honeypot.
☆150Updated 10 years ago
Alternatives and similar repositories for dockerpot
Users that are interested in dockerpot are comparing it to the libraries listed below
Sorting:
- Self contained cross platform DNS recon tool☆187Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Minion☆354Updated 6 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- The NoSQL Honeypot Framework☆102Updated last year
- Db Database Assessment Tool☆210Updated 7 years ago
- ☆78Updated 9 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆166Updated 9 years ago
- A Simple Elasticsearch Honeypot☆187Updated 10 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆119Updated 8 years ago
- drydock provides a flexible way of assessing the security of your Docker daemon configuration and containers using editable audit templat…☆65Updated 9 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- A Distributed, Search-Optimized Full Packet Capture System☆242Updated 2 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Updated 8 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆263Updated 7 years ago
- This is a LEGACY repo head to☆134Updated last year
- Malspider is a web spidering framework that detects characteristics of web compromises.☆416Updated 2 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- A collection of Ansible roles for automating infosec builds.☆93Updated 7 years ago
- Visualize statistics from a Kippo SSH honeypot☆134Updated 2 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Message Queue & Broker Injection tool☆150Updated 2 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- Honeynet Project generic authenticated datafeed protocol☆216Updated last year
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 7 years ago
- netgrafio - Visualize your network☆328Updated 10 years ago
- a grep -r for secrets☆178Updated 3 years ago