mushorg / gluttonLinks
Generic Low Interaction Honeypot
☆286Updated last month
Alternatives and similar repositories for glutton
Users that are interested in glutton are comparing it to the libraries listed below
Sorting:
- An SMTP Honeypot☆268Updated 6 months ago
- Super Next generation Advanced Reactive honEypot☆470Updated last year
- He who flays the hide☆229Updated last year
- Honeynet Project generic authenticated datafeed protocol☆216Updated 2 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆274Updated 6 years ago
- a network packet capture compiler☆202Updated 3 years ago
- 16,432 Free Yara rules created by☆389Updated 6 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆288Updated 7 years ago
- Web Application Honeypot☆586Updated last year
- Passive DNS collection using Zeek☆182Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆548Updated 2 years ago
- Zeek IDS Dockerfile☆101Updated 2 years ago
- Cross-platform Yara scanner written in Go☆328Updated 2 years ago
- Public Repository of all Publicly Available Packet Captures that I've used or come across☆182Updated 12 years ago
- virtual honeypots☆384Updated 2 years ago
- Core elements of the Modern Honey Network implemented in Docker☆34Updated 3 years ago
- Ready to run scripts for network analysis☆88Updated 7 months ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- The default package source of the Zeek Package Manager. Wrote a package? See the README for how to get it included.☆142Updated 2 weeks ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆541Updated 5 months ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆176Updated 4 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- DejaVU - Open Source Deception Framework☆418Updated 2 months ago
- Protocol Analysis/Decoder Framework☆496Updated 2 years ago
- Suricata Extreme Performance Tuning guide☆213Updated 7 years ago
- Credentials catching honeypot☆383Updated last year
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- GasPot Released at Blackhat 2015☆142Updated last year
- ☆174Updated 4 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆139Updated 6 months ago