phin3has / mailoney
An SMTP Honeypot
☆264Updated last week
Alternatives and similar repositories for mailoney:
Users that are interested in mailoney are comparing it to the libraries listed below
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- A low to medium interaction honeypot.☆466Updated last year
- Web Application Honeypot☆574Updated 8 months ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- A Simple Elasticsearch Honeypot☆185Updated 9 years ago
- Super Next generation Advanced Reactive honEypot☆461Updated 9 months ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆199Updated 3 years ago
- Passive DNS collection using Zeek☆182Updated last year
- Credentials catching honeypot☆377Updated 10 months ago
- Vulnerability Data in ES☆145Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Spam Honeypot with Intelligent Virtual Analyzer☆136Updated 2 weeks ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆143Updated 2 years ago
- Generic Low Interaction Honeypot☆270Updated this week
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆109Updated 11 months ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 4 years ago
- Machinae Security Intelligence Collector☆508Updated 10 months ago
- Honeypot deployment made easy☆235Updated 6 years ago
- A Wordpress Honeypot☆182Updated 2 years ago
- Sguil client for NSM☆218Updated last year
- Web service for scanning pcaps with snort☆108Updated 6 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated last year
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- Version 2 of the ThreatCrowd API☆269Updated 2 years ago
- A framework for receiving and redistributing abuse feeds☆123Updated 5 years ago
- He who flays the hide☆224Updated 7 months ago