phin3has / mailoney
An SMTP Honeypot
☆264Updated last year
Alternatives and similar repositories for mailoney:
Users that are interested in mailoney are comparing it to the libraries listed below
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Honeynet Project generic authenticated datafeed protocol☆215Updated last year
- Spam Honeypot with Intelligent Virtual Analyzer☆136Updated this week
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆142Updated 2 years ago
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- Web Application Honeypot☆573Updated 7 months ago
- A low to medium interaction honeypot.☆466Updated 11 months ago
- Credentials catching honeypot☆377Updated 9 months ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆199Updated 3 years ago
- A modular Python application to collect intelligence for malicious hosts.☆264Updated 3 years ago
- Malicious HTTP traffic explorer☆716Updated last year
- Passive DNS collection using Zeek☆182Updated last year
- Honeypot deployment made easy☆235Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆119Updated 4 years ago
- DPS' Lightweight Investigation Notebook☆427Updated last year
- A Simple Elasticsearch Honeypot☆187Updated 9 years ago
- A Wordpress Honeypot☆182Updated 2 years ago
- Generic Low Interaction Honeypot☆267Updated last week
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- ☆175Updated 4 years ago
- ☆202Updated last year
- Web App for Volatility framework☆379Updated 3 months ago
- Malware Sinkhole List in various formats☆102Updated 2 years ago
- Threat Intelligence APIs☆276Updated last year
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆369Updated 9 months ago
- A framework for receiving and redistributing abuse feeds☆123Updated 5 years ago
- ☆169Updated 3 years ago
- Visualize statistics from a Kippo SSH honeypot☆134Updated last year