pwnlandia / honeymapLinks
Real-time websocket stream of GPS events on a fancy SVG world map
☆19Updated 3 years ago
Alternatives and similar repositories for honeymap
Users that are interested in honeymap are comparing it to the libraries listed below
Sorting:
- Small App for reading from MHN's hpfeeds broker and writing splunk logs☆10Updated 5 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- NTP logger/honeypot☆53Updated 11 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Updated 3 years ago
- ☆22Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.☆52Updated 6 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Updated 11 years ago
- Python API for URL Query☆35Updated 9 years ago
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆43Updated 3 years ago
- Mitre chopshop network decoder framework☆30Updated 8 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Passive DNS V2☆60Updated 11 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Cyber Intel Management☆48Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago