mushorg / tanner
He who flays the hide
☆225Updated 8 months ago
Alternatives and similar repositories for tanner:
Users that are interested in tanner are comparing it to the libraries listed below
- Super Next generation Advanced Reactive honEypot☆461Updated 10 months ago
- Web Application Honeypot☆573Updated 8 months ago
- Credentials catching honeypot☆379Updated 10 months ago
- Generic Low Interaction Honeypot☆273Updated 3 weeks ago
- A low to medium interaction honeypot.☆466Updated last year
- A modular Python application to collect intelligence for malicious hosts.☆265Updated 4 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆272Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆665Updated last year
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- DPS' Lightweight Investigation Notebook☆429Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Home of the dionaea honeypot☆739Updated 8 months ago
- A Simple Elasticsearch Honeypot☆186Updated 9 years ago
- An SMTP Honeypot☆264Updated last week
- Modular file scanning/analysis framework☆619Updated 5 years ago
- ☆202Updated last year
- DejaVU - Open Source Deception Framework☆410Updated 2 years ago
- Machinae Security Intelligence Collector☆510Updated 11 months ago
- Spam Honeypot with Intelligent Virtual Analyzer☆137Updated 2 weeks ago
- ☆175Updated 4 years ago
- An open source framework for enterprise level automated analysis.☆396Updated 2 years ago
- virtual honeypots☆370Updated last year
- A modular Python application to pull intelligence about malicious files☆119Updated 4 years ago
- The pattern matching swiss knife☆138Updated 5 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago