philcryer / prickly-peteLinks
A script using Docker to quickly bring up some honeypots exposing lots of services. For research, reconnaissance, and fun. (DISCLAIMER may not be fun, not to be taken internally, aim away from face)
☆36Updated 5 months ago
Alternatives and similar repositories for prickly-pete
Users that are interested in prickly-pete are comparing it to the libraries listed below
Sorting:
- Honeypot (Dionaea and kippo) setup script☆83Updated 9 years ago
- A simple and effective phpmyadmin honeypot☆68Updated 7 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- NTP logger/honeypot☆55Updated 11 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Automatically scans for malicious proxies.☆31Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- Rogue AP killer☆92Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 9 years ago
- observation camera honeypot☆52Updated 10 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Updated 3 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Updated 8 years ago
- Core elements of the Modern Honey Network implemented in Docker☆35Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- VirusTotal tools☆92Updated 5 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- Mattermost - Shodan Slash command☆31Updated 9 years ago