naorlivne / dshpLinks
damn simple honey pot
☆18Updated 9 years ago
Alternatives and similar repositories for dshp
Users that are interested in dshp are comparing it to the libraries listed below
Sorting:
- automate your MISP installs☆68Updated 5 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Distributed Honeypot☆63Updated 7 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆55Updated 7 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Gather Open-Source Intelligence using PowerShell.☆177Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- A toolkit for Security Researchers☆128Updated 6 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆95Updated 4 years ago
- ☆50Updated 5 years ago
- Monitor geotagged social media from multiple platforms in real time.☆77Updated 6 years ago
- ☆13Updated 6 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆69Updated 2 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- pcqf (PC Quick Forensics) helps quickly gathering forensic evidence from Windows, Mac, and Linux systems, in order to identify potential …☆135Updated 2 years ago
- ☆30Updated 6 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Malware Simulator - Pretend a malware infection by creating a text file into several locations on the local system and also in the networ…☆26Updated 7 years ago
- ☆77Updated 6 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- MantaRay Automated Computer Forensic Triage Tool☆65Updated 6 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago