mushorg / snare
Super Next generation Advanced Reactive honEypot
☆461Updated 9 months ago
Alternatives and similar repositories for snare:
Users that are interested in snare are comparing it to the libraries listed below
- He who flays the hide☆225Updated 6 months ago
- Web Application Honeypot☆573Updated 7 months ago
- Home of the dionaea honeypot☆734Updated 7 months ago
- Generic Low Interaction Honeypot☆267Updated last week
- The Python SDK for AlienVault OTX☆370Updated 10 months ago
- A modular Python application to collect intelligence for malicious hosts.☆264Updated 3 years ago
- Extract and aggregate threat intelligence.☆851Updated last year
- Suricata, Snort and Zeek IDS rule and pcap testing system☆472Updated 2 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆542Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- A low to medium interaction honeypot.☆466Updated 11 months ago
- Scirius is a web application for Suricata ruleset management and threat hunting.☆646Updated 3 months ago
- Machinae Security Intelligence Collector☆507Updated 9 months ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Cuckoo Sandbox Dockerfile☆325Updated 4 years ago
- The tool for updating your Suricata rules.☆266Updated 3 months ago
- DejaVU - Open Source Deception Framework☆408Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Web Based Event Viewer (GUI) for Suricata EVE Events in Elastic Search☆448Updated this week
- Credentials catching honeypot☆377Updated 9 months ago
- ☆1,066Updated 5 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆556Updated this week
- Open Source Threat Intelligence Chat Bot☆322Updated 4 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆282Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆435Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆720Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆433Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,115Updated 5 years ago