philcryer / prickly-peteLinks
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
☆36Updated 4 months ago
Alternatives and similar repositories for prickly-pete
Users that are interested in prickly-pete are comparing it to the libraries listed below
Sorting:
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- A simple and effective phpmyadmin honeypot☆68Updated 7 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 9 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Masscan integrated with Shodan API☆43Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Leak File Analyzer☆62Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- An extensible honeypot framework☆96Updated 3 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Modern Honey Network App for Splunk☆50Updated 6 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆37Updated 3 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- Rogue AP killer☆92Updated 7 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year