philcryer / prickly-peteLinks
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
☆36Updated 6 months ago
Alternatives and similar repositories for prickly-pete
Users that are interested in prickly-pete are comparing it to the libraries listed below
Sorting:
- Scripts that are suited for blue teams☆33Updated 9 years ago
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- The Stratosphere IPS is a free software IPS that uses network behavior to detect and block malicious actions.☆33Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 8 years ago
- Automatically scans for malicious proxies.☆31Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- Transforms for the AlienVault OTX service☆39Updated 9 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- observation camera honeypot☆53Updated 10 years ago
- A simple and effective phpmyadmin honeypot☆68Updated 8 years ago
- Malware/IOC ingestion and processing engine☆109Updated 7 years ago
- Masscan integrated with Shodan API☆44Updated 8 years ago
- Repo for autosnort scripts.☆156Updated 5 years ago