mushorg / tanner
He who flays the hide
☆226Updated 8 months ago
Alternatives and similar repositories for tanner:
Users that are interested in tanner are comparing it to the libraries listed below
- Super Next generation Advanced Reactive honEypot☆462Updated 11 months ago
- Web Application Honeypot☆574Updated 9 months ago
- Generic Low Interaction Honeypot☆277Updated last month
- A low to medium interaction honeypot.☆467Updated last year
- Home of the dionaea honeypot☆741Updated 9 months ago
- Version 2 of the ThreatCrowd API☆271Updated 2 years ago
- A modular Python application to collect intelligence for malicious hosts.☆268Updated 4 years ago
- Code + documentation for the public GreyNoise API☆314Updated 4 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆137Updated last month
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆272Updated 6 years ago
- Open Source Threat Intelligence Chat Bot☆322Updated 5 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆668Updated last year
- An SMTP Honeypot☆264Updated last month
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆202Updated last year
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Credentials catching honeypot☆380Updated 11 months ago
- DejaVU - Open Source Deception Framework☆410Updated 2 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- ☆307Updated 7 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Evading Snort Intrusion Detection System.☆77Updated 3 years ago
- idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)☆281Updated last year
- Automatic Yara Rule Generation☆333Updated 9 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆369Updated 11 months ago
- Tool to extract indicators of compromise from security reports in PDF format☆434Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆429Updated last year
- Threat Intelligence APIs☆279Updated last year